Skip to main content

CVE-2022-39275: CWE-863: Incorrect Authorization in saleor saleor

Medium
Published: Thu Oct 06 2022 (10/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: saleor
Product: saleor

Description

Saleor is a headless, GraphQL commerce platform. In affected versions some GraphQL mutations were not properly checking the ID type input which allowed to access database objects that the authenticated user may not be allowed to access. This vulnerability can be used to expose the following information: Estimating database row counts from tables with a sequential primary key or Exposing staff user and customer email addresses and full name through the `assignNavigation()` mutation. This issue has been patched in main and backported to multiple releases (3.7.17, 3.6.18, 3.5.23, 3.4.24, 3.3.26, 3.2.14, 3.1.24). Users are advised to upgrade. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 16:07:02 UTC

Technical Analysis

CVE-2022-39275 is a medium-severity vulnerability affecting Saleor, a headless GraphQL commerce platform widely used for building e-commerce applications. The vulnerability stems from incorrect authorization checks in certain GraphQL mutations, specifically related to the handling of ID type inputs. In affected versions of Saleor (from 2.0.0 up to various patched versions in the 3.x series), the system fails to properly verify whether an authenticated user is authorized to access or manipulate certain database objects referenced by these IDs. This flaw allows an attacker with valid authentication to potentially access sensitive information beyond their permission scope. Notably, the vulnerability can be exploited to estimate database row counts in tables with sequential primary keys, which can aid in further reconnaissance. More critically, it can expose personally identifiable information (PII) such as staff user and customer email addresses and full names via the `assignNavigation()` mutation. This exposure risks privacy violations and could facilitate targeted phishing or social engineering attacks. The issue has been addressed and patched in multiple Saleor releases (3.7.17, 3.6.18, 3.5.23, 3.4.24, 3.3.26, 3.2.14, 3.1.24), and users are strongly advised to upgrade to these or later versions. There are no known workarounds, and no active exploits have been reported in the wild to date. The vulnerability is categorized under CWE-863 (Incorrect Authorization), indicating a failure to enforce proper access control policies within the application logic. Given Saleor’s role as a commerce platform, unauthorized data exposure could have significant privacy and business implications.

Potential Impact

For European organizations using Saleor as their e-commerce backend, this vulnerability poses a risk of unauthorized disclosure of sensitive customer and staff information, including email addresses and full names. Such data exposure can lead to privacy breaches, regulatory non-compliance under GDPR, and reputational damage. Attackers could leverage exposed data for phishing campaigns or identity theft. Additionally, the ability to estimate database row counts may aid attackers in mapping the database structure, potentially facilitating further targeted attacks. Although the vulnerability requires authentication, the risk remains significant in environments where user accounts may be compromised or where insider threats exist. The integrity and availability of the platform are less directly impacted; however, the confidentiality breach alone is critical given the nature of the exposed data. European organizations in retail, e-commerce, and related sectors relying on Saleor could face operational disruptions and legal consequences if this vulnerability is exploited.

Mitigation Recommendations

1. Immediate upgrade to the patched Saleor versions (3.7.17 or later, or the respective backported releases) is essential to remediate the vulnerability. 2. Conduct an audit of user roles and permissions within the Saleor platform to ensure the principle of least privilege is enforced, minimizing the risk of unauthorized access. 3. Implement enhanced monitoring and logging around GraphQL mutation activities, especially those involving ID inputs and navigation assignments, to detect anomalous access patterns. 4. Restrict access to the Saleor administrative and API endpoints to trusted networks or via VPN to reduce exposure. 5. Educate staff and users about phishing risks, as exposed email addresses could be used in targeted attacks. 6. Review and strengthen authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of compromised credentials being used to exploit this vulnerability. 7. If upgrading immediately is not feasible, consider isolating the Saleor instance and limiting user permissions temporarily, although no direct workaround exists. 8. Regularly review Saleor security advisories and apply updates promptly to mitigate future vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-02T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf4694

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 4:07:02 PM

Last updated: 8/17/2025, 10:52:23 PM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats