PatchSiren cyber security CVE debrief
CVE-2023-5045 Biltay Technology CVE debrief
CVE-2023-5045 is a critical SQL injection issue in Biltay Kayisi affecting versions before 1286. The published description states that improper neutralization of SQL command special elements could allow SQL injection and may also lead to command line execution through SQL injection. NVD lists the issue as network-reachable, unauthenticated, and high impact across confidentiality, integrity, and availability.
- Vendor
- Biltay Technology
- Product
- Kayisi
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-10-12
- Original CVE updated
- 2026-05-21
- Advisory published
- 2023-10-12
- Advisory updated
- 2026-05-21
Who should care
Administrators, operators, and security teams responsible for Biltay Kayisi deployments before version 1286 should treat this as urgent. Any environment exposing the affected application to untrusted input or external users should prioritize remediation.
Technical summary
The NVD record maps the weakness to CWE-89 and assigns CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, reflecting easy remote exploitation without privileges or user interaction. The affected CPE range is biltay:kayisi versions prior to 1286. The source advisory and NVD entry both characterize the issue as an SQL injection vulnerability, with the source description additionally noting potential command line execution through SQL injection.
Defensive priority
Critical. Remediate immediately by upgrading to a fixed version and validating exposure. Because the vulnerability is network-accessible and requires no authentication or user interaction, it should be handled as a high-priority patching item.
Recommended defensive actions
- Upgrade Biltay Kayisi to version 1286 or later.
- Confirm which systems run affected Kayisi versions and prioritize any internet-facing or broadly accessible deployments.
- Review the USOM advisory and the NVD record for any vendor-specific remediation guidance.
- Check application logs and database access logs for signs of abnormal query behavior around the exposure period.
- After upgrading, validate that the deployed version is no longer within the affected range.
Evidence notes
This debrief is based on the official NVD record, the CVE record, and the linked USOM advisory sources supplied in the corpus. The vulnerability description, affected version boundary, CVSS vector, and CWE-89 mapping come from the provided NVD metadata and source description. No KEV entry was supplied for this CVE.
Official resources
-
CVE-2023-5045 CVE record
CVE.org
-
CVE-2023-5045 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
CVE published on 2023-10-12 and last modified on 2026-05-21, based on the supplied CVE timeline fields. No Known Exploited Vulnerabilities (KEV) entry was provided.