CVE-2023-34362

Published Jun 2, 2023

Last updated 4 months ago

Exploit knownCVSS critical 9.8
Mysql
web application
Zero-day
API
SQL injection
Database

Overview

Description
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.
Source
cve@mitre.org
NVD status
Analyzed
Products
moveit_cloud, moveit_transfer

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Progress MOVEit Transfer SQL Injection Vulnerability
Exploit added on
Jun 2, 2023
Exploit action due
Jun 23, 2023
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-89
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-89

Social media

Hype score
Not currently trending
  1. 🚨 Would this get past your patching process? CVE-2023-34362 (MOVEit Transfer) A single SQL injection flaw The scary part wasn’t the exploit. It was how many fully patched orgs still got hit. 📘 Full CVE details & attack chain: https://t.co/6rIAIjLSch #MOVEit #DataBr

    @cvedatabase

    17 Feb 2026

    70 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  2. MOVEit zero-day hits NHS: Cl0p exploits CVE-2023-34362, halting services and exposing vendor risk. 2,000+ orgs affected; patch within 48h; zero-trust for vendors is key. Thoughts? Reply! https://t.co/oupiVWJOqU #Ransomware #HealthcareCyber #MOVEit

    @zench4n

    10 Dec 2025

    18 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  3. #Cl0p #ransomware listo a @SchneiderElec (https://t.co/1e9TKMd2to) entre sus victimas. El grupo explota vulnerabilidades específicas, como CVE-2023-34362 en MOVEit Transfer y más recientemente, zero-days en Oracle E-Business Suite (por ejemplo, CVE-2025-61882). https://t.co/

    @EdavPerez

    23 Oct 2025

    80 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. **🛡️ MOVEit Transfer Vuln Exploited by Clop 🔐** Critical MOVEit Transfer bug (CVE-2023-34362) actively exploited by Clop ransomware. Update immediately to protect data. Monitor network traffic, backup regularly. Stay informed!

    @Tudorel92659164

    1 Sept 2025

    116 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. Operation Log #019/2024 >>Hit https://t.co/FKyU9TWKwz ✅ MOVEit vuln (CVE-2023-34362). SQLi on /api/v2/files?file_path=test', MSSQL coughed up errors. Enabled xp_cmdshell, popped PS rev shell. SYSTEM access, yoinked 12GB gov's documents, VPN creds, .pst over TOR.

    @Z3R0L1T

    10 Jul 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    4 Replies

    0 Quotes

  6. Actively exploited CVE : CVE-2023-34362

    @transilienceai

    30 Jun 2025

    53 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  7. Actively exploited CVE : CVE-2023-34362

    @transilienceai

    29 Jun 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  8. Actively exploited CVE : CVE-2023-34362

    @transilienceai

    28 Jun 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  9. Actively exploited CVE : CVE-2023-34362

    @transilienceai

    28 Jun 2025

    33 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  10. Two year's on from the MOVEit breach (CVE-2023-34362) that impacted 2,000+ orgs and 62M+ individuals globally; What have we learned? Resilience is built in response. - Faster patch cycles - More transparent vendor disclosures - Greater scrutiny of software dependencies Progress!

    @gbc13

    25 May 2025

    73 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. Actively exploited CVE : CVE-2023-34362

    @transilienceai

    21 May 2025

    59 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  12. 🚨 MOVEit CVE-2023-34362 is being exploited. SMBs are prime targets. ✅ Patch now ✅ Disable HTTP/S if needed ✅ Check logs for unknown users Respond in <48h. 📄 Read Post For Check List #MOVEit #CVE34362 #CyberSecurity #PatchNow #OffSecGlobal https://t.co/r2WnzGgeNh

    @OffSecGlobal

    10 May 2025

    77 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  13. Actively exploited CVE : CVE-2023-34362

    @transilienceai

    3 Mar 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  14. New Cleo zero-day RCE flaw exploited in data theft attacks: https://t.co/kvzZG4nL64 Hackers are exploiting a zero-day vulnerability (CVE-2023-34362) in Cleo managed file transfer software, affecting versions 5.8.0.21 and earlier. This remote code execution flaw allows data theft

    @securityRSS

    10 Dec 2024

    47 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. **Breaking News: Hackers Exploit Zero-Day in Cleo MFT Software** Hackers are exploiting a zero-day vulnerability (CVE-2023-34362) in Cleo's managed file transfer software, including LexiCom, VLTrader, and Harmony, to breach corporate networks and steal data. The flaw affects… ht

    @him_yadav

    10 Dec 2024

    72 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. Actively exploited CVE : CVE-2023-34362

    @transilienceai

    21 Nov 2024

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  17. MOVEit Transfer Critical Vulnerability (May 2023) (CVE-2023-34362) - Progress Community https://t.co/3P6oEyjdpg

    @RoryCrave

    17 Nov 2024

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations