CVE-2023-30843

Payload is a free and open source headless content management system. In versions prior to 1.7.0, if a user has access to documents that contain hidden fields or fields they do not have access to, the user could reverse-engineer those values via brute force. Version 1.7.0 contains a patch. As a workaround, write a `beforeOperation` hook to remove `where` queries that attempt to access hidden field data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 08:00

Type Values Removed Values Added
References () https://github.com/payloadcms/payload/releases/tag/v1.7.0 - Release Notes () https://github.com/payloadcms/payload/releases/tag/v1.7.0 - Release Notes
References () https://github.com/payloadcms/payload/security/advisories/GHSA-35jj-vqcf-f2jf - Mitigation, Vendor Advisory () https://github.com/payloadcms/payload/security/advisories/GHSA-35jj-vqcf-f2jf - Mitigation, Vendor Advisory
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 7.4

Information

Published : 2023-04-26 21:15

Updated : 2024-11-21 08:00


NVD link : CVE-2023-30843

Mitre link : CVE-2023-30843

CVE.ORG link : CVE-2023-30843


JSON object : View

Products Affected

payloadcms

  • payload
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor