CVE-2023-27651

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to gain elevated privileges on the Ego Studio SuperClean application by exploiting a weakness in the update_info field of a specific XML file. To take advantage of this, the attacker needs access to the application’s files, which could lead to unauthorized control over the system.

Technical Description

An issue found in Ego Studio SuperClean v.1.1.9 and v.1.1.5 allows an attacker to gain privileges via the update_info field of the _default_.xml file.

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$2,684($1K-$5K)
Vendor Response
Grade FPatched in 1064 days

Quick Information

Published

Apr 14, 2023

almost 3 years ago

Last Modified

Mar 13, 2026

25 days ago

Vendor

egostudiogroup

Product

super clean