Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2025-46720
May 05, 2025
Keystone is a content management system for Node.js. Prior to version 6.5.0, "{field}.isFilterable" access control can be bypassed in "update" and "delete" mutations by adding additional unique filters. These filters can be used as an oracle to probe the existence or value of otherwise unreadable fields. Specifically, when a mutation includes a "where" clause with multiple unique filters (e.g. "id" and "email"), Keystone will attempt to match records even if filtering by the latter fields would normally be rejected by "field.isFilterable" or "list.defaultIsFilterable". This can allow malicious actors to infer the presence of a particular field value when a filter is successful in returning a result. This affects any project relying on the default or dynamic "isFilterable" behavior (at the list or field level) to prevent external users from using the filtering of fields as a discovery mechanism. While this access control is respected during "findMany" operations, it was not completely enforced during "update" and "delete" mutations when accepting more than one unique "where" values in filters. This has no impact on projects using "isFilterable: false" or "defaultIsFilterable: false" for sensitive fields, or for those who have otherwise omitted filtering by these fields from their GraphQL schema. This issue has been patched in "@keystone-6/core" version 6.5.0. To mitigate this issue in older versions where patching is not a viable pathway, set "isFilterable: false" statically for relevant fields to prevent filtering by them earlier in the access control pipeline (that is, don't use functions); set "{field}.graphql.omit.read: true" for relevant fields, which implicitly removes filtering by these fields from the GraphQL schema; and/or deny "update" and "delete" operations for the relevant lists completely.
Affected Packages
https://github.com/keystonejs/keystone.git (GITHUB):
Affected version(s) >=@keystone-6/core@1.0.0 <@keystone-6/core@6.5.0
Fix Suggestion:
Update to version @keystone-6/core@6.5.0
@keystone-6/core (NPM):
Affected version(s) >=0.0.0-rc-20221013033655 <6.5.0
Fix Suggestion:
Update to version 6.5.0
Do you need more information?
Contact Us
CVSS v4
Base Score:
2.3
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
3.1
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Observable Discrepancy
Exposure of Sensitive Information to an Unauthorized Actor
EPSS
Base Score:
0.07