Incorrect Authorization
CVE-2023-48218
Summary
The Strapi Protected Populate Plugin protects `get` endpoints from revealing too much information. In versions prior to 1.3.4, users were able to bypass the field-level security. Users who tried to populate something that they didn't have access to could populate those fields anyway. There are no known workarounds.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- LOW
- NONE
CWE-863 - Incorrect Authorization
Authorization is a security mechanism performed by an application to grant or deny access to the requested resources by verifying the privileges of the user. When an application lacks effective authorization mechanisms, it enables unauthorized users to gain unintended privileges and illegitimate access to resources. Such a vulnerability may result in exposure of sensitive information, denial of service, arbitrary code execution, and complete system takeover.
References
Advisory Timeline
- Published