Discover the impact of CVE-2023-40027, a vulnerability in @keystone-6/core versions prior to 5.5.1, allowing unauthorized access to sensitive information. Learn how to mitigate the risk.
Keystone is an open source headless CMS for Node.js — built with GraphQL and React. The vulnerability, CVE-2023-40027, involves conditionally missing authorization in @keystone-6/core, specifically affecting versions prior to 5.5.1.
Understanding CVE-2023-40027
This section covers the key details and impact of CVE-2023-40027.
What is CVE-2023-40027?
The CVE-2023-40027 vulnerability allows public access to the
adminMeta
GraphQL query in Keystone when ui.isAccessAllowed
is set as undefined
. This behavior differs from the default AdminUI middleware, potentially exposing sensitive information.
The Impact of CVE-2023-40027
The impact of this vulnerability is that unauthorized users can access
adminMeta
GraphQL query without the necessary session, potentially compromising the security and confidentiality of the system.
Technical Details of CVE-2023-40027
In this section, we delve into the technical details of the vulnerability.
Vulnerability Description
When
ui.isAccessAllowed
is undefined, the adminMeta
query becomes publicly accessible even without a session, contrary to the expected behavior.
Affected Systems and Versions
The vulnerability affects versions of @keystone-6/core prior to 5.5.1.
Exploitation Mechanism
Unauthorized users can exploit this vulnerability to gain access to sensitive
adminMeta
GraphQL query without the need for proper authentication.
Mitigation and Prevention
To address CVE-2023-40027, immediate steps should be taken to secure the affected systems.
Immediate Steps to Take
isAccessAllowed
functionality to mitigate the risk.Long-Term Security Practices
Patching and Updates
Ensure timely application of software patches and updates provided by Keystone to address known security vulnerabilities.