Skip to main content

Incorrect Authorization

CVE-2023-48218

Severity Medium
Score 5.3/10

Summary

The Strapi Protected Populate Plugin protects `get` endpoints from revealing too much information. In versions prior to 1.3.4, users were able to bypass the field-level security. Users who tried to populate something that they didn't have access to could populate those fields anyway. There are no known workarounds.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • LOW
  • NONE

CWE-863 - Incorrect Authorization

Authorization is a security mechanism performed by an application to grant or deny access to the requested resources by verifying the privileges of the user. When an application lacks effective authorization mechanisms, it enables unauthorized users to gain unintended privileges and illegitimate access to resources. Such a vulnerability may result in exposure of sensitive information, denial of service, arbitrary code execution, and complete system takeover.

Advisory Timeline

  • Published