Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-7327: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Ozeki Ltd. Ozeki SMS Gateway

0
High
VulnerabilityCVE-2023-7327cvecve-2023-7327cwe-22
Published: Wed Nov 12 2025 (11/12/2025, 22:07:07 UTC)
Source: CVE Database V5
Vendor/Project: Ozeki Ltd.
Product: Ozeki SMS Gateway

Description

Ozeki SMS Gateway versions up to and including 10.3.208 contain a path traversal vulnerability. Successful exploitation allows an unauthenticated attacker to use URL-encoded traversal sequences to read arbitrary files from the underlying filesystem with the privileges of the gateway service, leading to disclosure of sensitive information.

AI-Powered Analysis

AILast updated: 11/12/2025, 22:31:57 UTC

Technical Analysis

CVE-2023-7327 is a path traversal vulnerability classified under CWE-22 found in Ozeki Ltd.'s Ozeki SMS Gateway software, specifically affecting versions up to and including 10.3.208. The vulnerability arises from improper limitation of pathname inputs, allowing attackers to manipulate URL-encoded traversal sequences (e.g., '../') to access files outside the intended directory scope. Exploitation requires no authentication or user interaction, making it highly accessible to remote attackers. When exploited, the attacker can read arbitrary files on the server's filesystem with the same privileges as the SMS Gateway service, potentially exposing sensitive configuration files, credentials, or other confidential data. The vulnerability has a CVSS 4.0 score of 8.7, reflecting its high impact on confidentiality and ease of exploitation. Although no public exploits have been reported yet, the lack of authentication and the critical nature of the data handled by SMS gateways make this a significant threat. The vulnerability affects the core functionality of the SMS gateway, which is often integrated into enterprise communication systems, increasing the risk of lateral movement or further compromise if leveraged in a broader attack. The absence of available patches at the time of reporting necessitates immediate risk mitigation through network-level controls and monitoring.

Potential Impact

For European organizations, the exploitation of CVE-2023-7327 could lead to unauthorized disclosure of sensitive information such as system configurations, user credentials, or message contents processed by the Ozeki SMS Gateway. This can compromise the confidentiality of communications and potentially enable further attacks like privilege escalation or lateral movement within networks. Organizations relying on SMS gateways for critical communications, including financial institutions, healthcare providers, and government agencies, face increased risks of data breaches and regulatory non-compliance under GDPR. The vulnerability's unauthenticated nature means attackers can exploit it remotely without prior access, increasing the attack surface. Additionally, exposure of sensitive files could undermine trust in communication channels and disrupt business operations. The lack of known exploits currently limits immediate widespread impact, but the vulnerability remains a significant risk if weaponized. European entities with integrated SMS gateway infrastructure should consider this a high-priority threat due to the potential for sensitive data leakage and operational disruption.

Mitigation Recommendations

1. Immediately restrict external network access to the Ozeki SMS Gateway interface by implementing firewall rules or network segmentation to limit exposure only to trusted internal systems. 2. Employ web application firewalls (WAFs) with custom rules to detect and block URL-encoded traversal sequences and suspicious path manipulation attempts targeting the gateway. 3. Conduct thorough input validation and sanitization on all user-supplied parameters at the application level to prevent traversal sequences from being processed. 4. Monitor gateway logs for unusual file access patterns or repeated traversal attempts to detect potential exploitation attempts early. 5. If possible, run the SMS Gateway service with the least privileges necessary to limit the impact of file disclosure. 6. Engage with Ozeki Ltd. for timely patch releases and apply updates as soon as they become available. 7. Consider deploying intrusion detection systems (IDS) tuned to detect path traversal attack signatures. 8. Review and restrict file system permissions to minimize accessible sensitive files by the gateway service. 9. Educate IT and security teams about this vulnerability to ensure rapid response and remediation. 10. As a temporary workaround, disable or isolate vulnerable gateway instances until patches are applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-11-12T20:13:33.736Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691509abe6b3e50d509f11bf

Added to database: 11/12/2025, 10:26:51 PM

Last enriched: 11/12/2025, 10:31:57 PM

Last updated: 11/12/2025, 11:35:42 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats