Path Traversal Vulnerability in Ozeki SMS Gateway
CVE-2023-7327
Key Information:
- Vendor
Ozeki Ltd.
- Status
- Vendor
- CVE Published:
- 12 November 2025
Badges
What is CVE-2023-7327?
The Ozeki SMS Gateway is affected by a path traversal vulnerability, which allows unauthenticated attackers to exploit URL-encoded traversal sequences. This exploitation can lead to unauthorized access and reading of sensitive files from the underlying filesystem, operating under the privileges of the gateway service. As a result, attackers may gain exposure to confidential information that could have serious implications for users and organizations relying on this service.
Affected Version(s)
Ozeki SMS Gateway 0 <= 10.3.208
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
