PatchSiren cyber security CVE debrief
CVE-2023-4541 Ween Software CVE debrief
CVE-2023-4541 is a critical SQL injection affecting Ween Admin Panel / Management Panel through 20231229. NVD classifies the weakness as CWE-89 and assigns a CVSS 3.1 score of 9.8 with a vector of AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, which means the issue is network-reachable, requires no privileges or user interaction, and can have full impact on confidentiality, integrity, and availability. The source advisory also notes that the vendor was contacted early and did not respond.
- Vendor
- Ween Software
- Product
- Admin Panel
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-12-29
- Original CVE updated
- 2026-05-21
- Advisory published
- 2023-12-29
- Advisory updated
- 2026-05-21
Who should care
Security teams and administrators responsible for Ween Admin Panel / Management Panel deployments, especially if the interface is reachable from untrusted networks or used to manage sensitive data.
Technical summary
The supplied NVD record describes CVE-2023-4541 as an SQL injection vulnerability (CWE-89) in Ween Management Panel / Admin Panel affecting versions through 20231229. The recorded CVSS 3.1 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a remotely exploitable issue with no authentication or user interaction required and high potential impact. A USOM advisory is referenced in the source corpus as third-party validation of the issue.
Defensive priority
Immediate
Recommended defensive actions
- Inventory all Ween Admin Panel / Management Panel instances and identify any systems running a version through 20231229.
- Restrict network access to the administrative interface until the affected systems are patched or otherwise mitigated.
- Apply a vendor-provided fix if one becomes available; if not, remove external exposure or isolate the system.
- Review relevant application and database logs for unusual query patterns, SQL errors, or unexpected administrative activity.
- Treat data handled by exposed instances as potentially at risk until the environment has been validated.
Evidence notes
This debrief is grounded in the CVE record published on 2023-12-29 and the NVD record supplied in the corpus. The record attributes the issue to CWE-89 and provides the CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The source description states that the vendor was contacted early but did not respond. The later NVD modified timestamp is record metadata and should not be read as the vulnerability disclosure date.
Official resources
-
CVE-2023-4541 CVE record
CVE.org
-
CVE-2023-4541 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly recorded on 2023-12-29 in the CVE/NVD ecosystem. The supplied description says the vendor was contacted early about the disclosure but did not respond.