CVE-2023-48381

Softnext Mail SQR Expert - Local File Inclusion-1

Description

Softnext Mail SQR Expert is an email management platform, it has a Local File Inclusion (LFI) vulnerability in a special URL. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary PHP file with .asp file extension under specific system paths, to access and modify partial system information but does not affect service availability.

Remediation

Solution:

  • Update version to 230430.

Category

6.5
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.34%
Third-Party Advisory org.tw
Affected: Softnext Mail SQR Expert
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-48381?
CVE-2023-48381 has been scored as a medium severity vulnerability.
How to fix CVE-2023-48381?
To fix CVE-2023-48381: Update version to 230430.
Is CVE-2023-48381 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-48381 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-48381?
CVE-2023-48381 affects Softnext Mail SQR Expert .
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.