icon

We found results for “

CVE-2025-46720

Good to know:

icon
icon

Date: May 5, 2025

Keystone is a content management system for Node.js. Prior to version 6.5.0, "{field}.isFilterable" access control can be bypassed in "update" and "delete" mutations by adding additional unique filters. These filters can be used as an oracle to probe the existence or value of otherwise unreadable fields. Specifically, when a mutation includes a "where" clause with multiple unique filters (e.g. "id" and "email"), Keystone will attempt to match records even if filtering by the latter fields would normally be rejected by "field.isFilterable" or "list.defaultIsFilterable". This can allow malicious actors to infer the presence of a particular field value when a filter is successful in returning a result. This affects any project relying on the default or dynamic "isFilterable" behavior (at the list or field level) to prevent external users from using the filtering of fields as a discovery mechanism. While this access control is respected during "findMany" operations, it was not completely enforced during "update" and "delete" mutations when accepting more than one unique "where" values in filters. This has no impact on projects using "isFilterable: false" or "defaultIsFilterable: false" for sensitive fields, or for those who have otherwise omitted filtering by these fields from their GraphQL schema. This issue has been patched in "@keystone-6/core" version 6.5.0. To mitigate this issue in older versions where patching is not a viable pathway, set "isFilterable: false" statically for relevant fields to prevent filtering by them earlier in the access control pipeline (that is, don't use functions); set "{field}.graphql.omit.read: true" for relevant fields, which implicitly removes filtering by these fields from the GraphQL schema; and/or deny "update" and "delete" operations for the relevant lists completely.

Severity Score

Severity Score

Weakness Type (CWE)

Exposure of Sensitive Information to an Unauthorized Actor

CWE-200

Observable Discrepancy

CWE-203

Top Fix

icon

Upgrade Version

Upgrade to version @keystone-6/core - 6.5.0;https://github.com/keystonejs/keystone.git - @keystone-6/core@6.5.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us