CVE-2023-31044
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker, who is already authenticated as a user, to inject harmful code into the Campaign Name field, which can then be exported to a CSV file. When this file is opened in spreadsheet software, it may automatically execute the malicious code, potentially leading to data theft or other harmful actions.
Technical Description
An issue was discovered in Nokia Impact before Mobile 23_FP1. In Impact DM 19.11 onwards, a remote authenticated user, using the Add Campaign functionality, can inject a malicious payload within the Campaign Name. This data can be exported to a CSV file. Attackers can populate data fields that may attempt data exfiltration or other malicious activity when automatically executed by the spreadsheet software.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 3, 2026
about 1 month ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
nokia
Product
impact mobile
Related Vulnerabilities
This vulnerability allows an attacker with valid login credentials to upload malicious executable files to the server, which could lead to unauthorized control over the system. It can be exploited when adding or editing applications within the Nokia IMPACT platform.
This vulnerability allows an authenticated user to exploit a flaw in the Nokia IMPACT system to extract sensitive information from the database, such as user credentials and database details, by manipulating a specific web request. To take advantage of this, the attacker must already have access to the system as a logged-in user.
This vulnerability allows an attacker, who is already logged into the Nokia IMPACT system, to upload malicious JavaScript files that can be executed when other users visit the affected web page. The attacker can exploit this during the process of adding or editing applications, potentially leading to unauthorized actions on behalf of those users.