CVE-2023-4815
Published: 07 September 2023
Summary
CVE-2023-4815 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Answer Answer. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
This vulnerability is AI-related — categorised as Enterprise AI Assistants; in the Other ATLAS/OWASP Terms risk domain; MITRE ATLAS techniques in scope: AI Model Inference API Access (AML.T0040), LLM Prompt Injection (AML.T0051), Manipulate AI Model (AML.T0018).
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.
Requiring identification and rationale for actions allowed without authentication ensures critical functions are not left unprotected by forcing review of authentication requirements.
Authorizing mobile device connections to organizational systems ensures authentication is performed for this critical access function.
Guarantees critical functions are protected by mandatory invocation of the access control mechanism.
Auditing sessions makes it possible to detect access to critical functions without required authentication.
The assessment process confirms authentication is present and effective for critical functions, preventing exploitation from missing authentication.
Certification assesses that critical functions have required authentication controls in place.
Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authentication for a critical function in the public-facing web application (Answer prior to v1.1.3) enables adversaries to exploit the application without credentials for initial access.
MITRE ATLAS TechniquesAI
MITRE ATLAS techniques
NVD Description
Missing Authentication for Critical Function in GitHub repository answerdev/answer prior to v1.1.3.
Deeper analysisAI
Automated synthesis unavailable for this CVE.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Enterprise AI Assistants
- Risk Domain
- Other ATLAS/OWASP Terms
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- The GitHub repository answerdev/answer is an open-source AI knowledge base and Q&A platform powered by LLMs, fitting the Enterprise AI Assistants category. The vulnerability was reported on huntr.dev, a bug bounty platform for AI/ML, confirming its AI relevance.