PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-3716 Oduyo CVE debrief

CVE-2023-3716 is a critical SQL injection issue affecting Oduyo Online Collection software before version 1.0.1. The available advisories identify it as CWE-89 and rate it as network-reachable with no privileges or user interaction required in the CVSS vector, making it high priority for patching and validation.

Vendor
Oduyo
Product
Online Collection
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2023-08-08
Original CVE updated
2026-05-21
Advisory published
2023-08-08
Advisory updated
2026-05-21

Who should care

Administrators, developers, and security teams responsible for Oduyo Online Collection deployments should treat this as urgent, especially if the software is internet-facing or handles sensitive data.

Technical summary

NVD lists the affected CPE as oduyo:online_collection with vulnerability coverage ending before 1.0.1. The CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, and the weakness mapping provided by USOM identifies CWE-89 (SQL Injection).

Defensive priority

Critical. The CVSS score is 9.8 and the attack conditions indicate a remotely reachable flaw with no privileges or user interaction required, so remediation should be prioritized immediately.

Recommended defensive actions

  • Upgrade Oduyo Online Collection to version 1.0.1 or later.
  • Review any application code or configuration that builds SQL queries from user input and replace dynamic queries with parameterized statements.
  • Validate and sanitize all externally supplied input on affected application paths.
  • Check the USOM advisory and NVD record for vendor guidance and version scope.
  • Monitor application and database logs for SQL syntax errors or unusual query patterns during and after remediation.

Evidence notes

This debrief is based only on the supplied NVD record and linked USOM advisories. NVD provides the CVSS vector, affected version boundary before 1.0.1, and official record links. USOM identifies the weakness as CWE-89 and serves as the third-party advisory reference.

Official resources

CVE published 2023-08-08 and last modified 2026-05-21. The supplied record does not indicate KEV inclusion or ransomware campaign use.