Access Control Bypass Affecting @keystone-6/core package, versions >=2.2.0 <2.3.1
Threat Intelligence
EPSS
0.24% (65th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-KEYSTONE6CORE-3052876
- published 19 Oct 2022
- disclosed 18 Oct 2022
- credit Marek R
Introduced: 18 Oct 2022
CVE-2022-39322 Open this link in a new tabHow to fix?
Upgrade @keystone-6/core
to version 2.3.1 or higher.
Overview
Affected versions of this package are vulnerable to Access Control Bypass via the multiselect
field, due to field-level
access control not being used.
Note:
List-level
access control is NOT affected.
Field-level
access control for fields other than multiselect
are NOT affected.
Workaround
Users who are unable to upgrade to the fixed version should stop using the multiselect
field.
References
CVSS Scores
version 3.1