Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 13 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ozeki
Ozeki ozeki Ng Sms Gateway |
|
| Vendors & Products |
Ozeki
Ozeki ozeki Ng Sms Gateway |
Wed, 12 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ozeki SMS Gateway versions up to and including 10.3.208 contain a path traversal vulnerability. Successful exploitation allows an unauthenticated attacker to use URL-encoded traversal sequences to read arbitrary files from the underlying filesystem with the privileges of the gateway service, leading to disclosure of sensitive information. | |
| Title | Ozeki SMS Gateway <= 10.3.208 Unauthenticated Arbitrary File Read | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:08:25.490Z
Reserved: 2025-11-12T20:13:33.736Z
Link: CVE-2023-7327
Updated: 2025-11-13T17:03:05.212Z
Status : Deferred
Published: 2025-11-12T22:15:42.680
Modified: 2026-04-15T00:35:42.020
Link: CVE-2023-7327
No data.
OpenCVE Enrichment
Updated: 2025-11-13T15:50:17Z