PatchSiren cyber security CVE debrief
CVE-2023-3716 Oduyo CVE debrief
CVE-2023-3716 is a critical SQL injection issue affecting Oduyo Online Collection software before version 1.0.1. The available advisories identify it as CWE-89 and rate it as network-reachable with no privileges or user interaction required in the CVSS vector, making it high priority for patching and validation.
- Vendor
- Oduyo
- Product
- Online Collection
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-08-08
- Original CVE updated
- 2026-05-21
- Advisory published
- 2023-08-08
- Advisory updated
- 2026-05-21
Who should care
Administrators, developers, and security teams responsible for Oduyo Online Collection deployments should treat this as urgent, especially if the software is internet-facing or handles sensitive data.
Technical summary
NVD lists the affected CPE as oduyo:online_collection with vulnerability coverage ending before 1.0.1. The CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, and the weakness mapping provided by USOM identifies CWE-89 (SQL Injection).
Defensive priority
Critical. The CVSS score is 9.8 and the attack conditions indicate a remotely reachable flaw with no privileges or user interaction required, so remediation should be prioritized immediately.
Recommended defensive actions
- Upgrade Oduyo Online Collection to version 1.0.1 or later.
- Review any application code or configuration that builds SQL queries from user input and replace dynamic queries with parameterized statements.
- Validate and sanitize all externally supplied input on affected application paths.
- Check the USOM advisory and NVD record for vendor guidance and version scope.
- Monitor application and database logs for SQL syntax errors or unusual query patterns during and after remediation.
Evidence notes
This debrief is based only on the supplied NVD record and linked USOM advisories. NVD provides the CVSS vector, affected version boundary before 1.0.1, and official record links. USOM identifies the weakness as CWE-89 and serves as the third-party advisory reference.
Official resources
-
CVE-2023-3716 CVE record
CVE.org
-
CVE-2023-3716 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
CVE published 2023-08-08 and last modified 2026-05-21. The supplied record does not indicate KEV inclusion or ransomware campaign use.