Description
In Stimulsoft Designer (Desktop) 2023.1.5, and 2023.1.4, once an attacker decompiles the Stimulsoft.report.dll the attacker is able to decrypt any connectionstring stored in .mrt files since a static secret is used. The secret does not differ between the tested versions and different operating systems.
Exploits (1)
References (3)
Core 3
Core References
Product
http://stimulsoft.com
Broken Link
https://cloud-trustit.spp.at/s/Db8ZfNq2WYiNCHa
Exploit, Third Party Advisory
https://cves.at/posts/cve-2023-25263/writeup/
Scores
CVSS v3
5.5
EPSS
0.0005
EPSS Percentile
16.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-312
Status
published
Products (2)
stimulsoft/designer
2023.1.4 (2 CPE variants)
stimulsoft/designer
2023.1.5 (2 CPE variants)
Published
Mar 27, 2023
Tracked Since
Feb 18, 2026