CVE-2023-27651
High
|7.8Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to gain elevated privileges on the Ego Studio SuperClean application by exploiting a weakness in the update_info field of a specific XML file. To take advantage of this, the attacker needs access to the application’s files, which could lead to unauthorized control over the system.
Technical Description
An issue found in Ego Studio SuperClean v.1.1.9 and v.1.1.5 allows an attacker to gain privileges via the update_info field of the _default_.xml file.
CVSS Vector Analysis
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$2,684($1K-$5K)
Vendor Response
Grade FPatched in 1064 days
Quick Information
Published
Apr 14, 2023
almost 3 years ago
Last Modified
Mar 13, 2026
25 days ago
Vendor
egostudiogroup
Product
super clean