Skip to content

Bypass of field access control in strapi-plugin-protected-populate

Moderate severity GitHub Reviewed Published Nov 20, 2023 in strapi-community/strapi-plugin-protected-populate • Updated Nov 20, 2023

Package

npm strapi-plugin-protected-populate (npm)

Affected versions

< 1.3.4

Patched versions

1.3.4

Description

Impact

Users are able to bypass the field level security. This means fields that they where not allowed to populate could be populated anyway even in the event that they tried to populate something that they don't have access to.

Patches

This issue has been patched in 1.3.4

Workarounds

None

References

Published by the National Vulnerability Database Nov 20, 2023
Published to the GitHub Advisory Database Nov 20, 2023
Reviewed Nov 20, 2023
Last updated Nov 20, 2023

Severity

Moderate
5.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

CVE-2023-48218

GHSA ID

GHSA-6h67-934r-82g7
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.