EUVD-2026-23798

| CVE-2026-5964 CRITICAL
2026-04-20 twcert GHSA-f5h4-jpqg-93m3
9.3
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

4
Analysis Updated
Apr 20, 2026 - 08:27 vuln.today
v2 (cvss_changed)
Re-analysis Queued
Apr 20, 2026 - 08:22 vuln.today
cvss_changed
CVSS Changed
Apr 20, 2026 - 08:22 NVD
9.8 (CRITICAL) 9.3 (CRITICAL)
Analysis Generated
Apr 20, 2026 - 07:56 vuln.today

DescriptionNVD

EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

AnalysisAI

SQL Injection in Digiwin EasyFlow .NET enables unauthenticated remote attackers to execute arbitrary SQL commands against the application database, allowing full compromise of data confidentiality, integrity, and availability. Taiwan CERT (TWCERT) publicly disclosed this critical vulnerability with CVSS 9.3 scoring, indicating network-accessible exploitation requiring no authentication or user interaction. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all Digiwin EasyFlow .NET deployments and immediately isolate any internet-facing or network-accessible instances from production traffic. Within 7 days: Contact Digiwin for patch availability and timeline; implement network segmentation to restrict access to administrative networks only, and enable SQL query logging and database activity monitoring. …

Sign in for detailed remediation steps.

Share

EUVD-2026-23798 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy