CVE-2022-39275

MEDIUM LAB

Saleor < 3.1.24 - Incorrect Authorization

Title source: rule
STIX 2.1

Description

Saleor is a headless, GraphQL commerce platform. In affected versions some GraphQL mutations were not properly checking the ID type input which allowed to access database objects that the authenticated user may not be allowed to access. This vulnerability can be used to expose the following information: Estimating database row counts from tables with a sequential primary key or Exposing staff user and customer email addresses and full name through the `assignNavigation()` mutation. This issue has been patched in main and backported to multiple releases (3.7.17, 3.6.18, 3.5.23, 3.4.24, 3.3.26, 3.2.14, 3.1.24). Users are advised to upgrade. There are no known workarounds for this issue.

Exploits (1)

nomisec WRITEUP
by omar2535 · poc
https://github.com/omar2535/CVE-2022-39275

Scores

CVSS v3 5.3
EPSS 0.0034
EPSS Percentile 56.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Lab Environment

COMMUNITY
Community Lab
docker pull jaegertracing/all-in-one
docker pull mailhog/mailhog

Details

CWE
CWE-20 CWE-863
Status published
Products (1)
saleor/saleor 2.0.0 - 3.1.24
Published Oct 06, 2022
Tracked Since Feb 18, 2026