PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-3651 Digital Ant CVE debrief

CVE-2023-3651 is a critical SQL injection vulnerability in Digital Ant E-Commerce Software affecting versions before 11. The issue is rated CVSS 3.1 9.8 and is network-exploitable with no privileges or user interaction required. Based on the CVSS vector and the CWE classification, successful exploitation could expose, alter, or disrupt sensitive application data. Organizations running affected Digital Ant E-Commerce Software should treat this as an urgent remediation item.

Vendor
Digital Ant
Product
E-Commerce Software
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2023-08-08
Original CVE updated
2026-05-21
Advisory published
2023-08-08
Advisory updated
2026-05-21

Who should care

Security teams, application owners, and administrators responsible for Digital Ant E-Commerce Software deployments, especially any environment still running a version earlier than 11. Web application and database administrators should also care because SQL injection typically targets backend data handling paths.

Technical summary

The official record classifies this issue as CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). NVD lists the affected product criteria as cpe:2.3:a:digital-ant:digital_ant:* with vulnerable versions ending before 11. The CVSS vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H indicates a remotely reachable flaw that requires no authentication or user interaction and can have high confidentiality, integrity, and availability impact.

Defensive priority

Urgent. The combination of CVSS 9.8, remote exploitability, and no authentication requirement makes this a high-priority remediation item for any exposed deployment.

Recommended defensive actions

  • Upgrade Digital Ant E-Commerce Software to version 11 or later, or the vendor-fixed release referenced by your trusted advisory process.
  • Inventory all instances of Digital Ant E-Commerce Software and confirm whether any system is running a version earlier than 11.
  • Review externally reachable application endpoints and database-related request handling for SQL injection exposure.
  • Validate that input validation, parameterized queries, and server-side query construction controls are in place across affected code paths.
  • Increase monitoring for abnormal database queries, unexpected errors, and signs of data-access anomalies while remediation is underway.

Evidence notes

This debrief is based on the supplied official CVE/NVD record and referenced USOM advisories. The NVD metadata lists the weakness as CWE-89 and the vulnerable version range as ending before 11 for Digital Ant E-Commerce Software. The CVSS vector provided by NVD is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. No KEV listing was supplied in the source corpus.

Official resources

Published in the CVE record on 2023-08-08 and modified on 2026-05-21. No KEV entry was provided in the source corpus.