CVE-2022-39322: CWE-285: Improper Authorization in keystonejs keystone
@keystone-6/core is a core package for Keystone 6, a content management system for Node.js. Starting with version 2.2.0 and prior to version 2.3.1, users who expected their `multiselect` fields to use the field-level access control - if configured - are vulnerable to their field-level access control not being used. List-level access control is not affected. Field-level access control for fields other than `multiselect` are not affected. Version 2.3.1 contains a fix for this issue. As a workaround, stop using the `multiselect` field.
AI Analysis
Technical Summary
CVE-2022-39322 is a medium-severity vulnerability affecting the Keystone 6 content management system (CMS) for Node.js, specifically versions from 2.2.0 up to but not including 2.3.1. The vulnerability arises from improper authorization (CWE-285) in the implementation of field-level access control for the `multiselect` field type within the @keystone-6/core package. While list-level access control and field-level access control for other field types remain unaffected, the `multiselect` field does not enforce configured access restrictions properly. This means that users who rely on field-level access control to restrict access to `multiselect` fields may inadvertently expose sensitive data or allow unauthorized modifications through these fields. The issue was resolved in version 2.3.1, and a recommended workaround prior to patching is to avoid using the `multiselect` field altogether. There are no known exploits in the wild at this time, but the vulnerability represents a risk for applications that utilize this specific field type and rely on field-level access control for security. The flaw could allow unauthorized users to read or modify data in `multiselect` fields, potentially leading to data leakage or unauthorized data manipulation within the CMS environment.
Potential Impact
For European organizations using Keystone 6 CMS versions between 2.2.0 and 2.3.0, this vulnerability could lead to unauthorized access or modification of sensitive content managed via `multiselect` fields. This may compromise the confidentiality and integrity of data, especially in sectors where content management systems hold critical or regulated information, such as media, government, education, and healthcare. Unauthorized data exposure could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and potential operational disruptions if data integrity is compromised. Since Keystone is often used in web applications and intranet portals, exploitation could also facilitate further lateral movement or privilege escalation within an organization's infrastructure if combined with other vulnerabilities. Although no known exploits exist currently, the ease of exploitation is moderate because it requires the presence of the vulnerable field type and the absence of other compensating controls. The vulnerability does not affect list-level access control, which may limit the scope somewhat, but organizations relying heavily on field-level controls for granular security are at higher risk.
Mitigation Recommendations
1. Immediate upgrade to Keystone 6 version 2.3.1 or later, where the vulnerability is fixed, is the most effective mitigation. 2. If upgrading is not immediately feasible, remove or replace all `multiselect` fields in the CMS schema to prevent unauthorized access through these fields. 3. Conduct an audit of all content managed via `multiselect` fields to identify potentially exposed sensitive data. 4. Implement additional compensating controls such as web application firewalls (WAFs) with rules to detect anomalous access patterns targeting `multiselect` fields. 5. Review and tighten user roles and permissions to minimize the number of users who can access or modify sensitive fields, especially those using `multiselect`. 6. Monitor logs for unusual access or modification attempts on `multiselect` fields. 7. Educate developers and administrators about this vulnerability to ensure that future schema designs avoid reliance on vulnerable field types without proper access controls. 8. Consider implementing additional application-layer encryption or tokenization for sensitive data stored in CMS fields to reduce impact in case of unauthorized access.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2022-39322: CWE-285: Improper Authorization in keystonejs keystone
Description
@keystone-6/core is a core package for Keystone 6, a content management system for Node.js. Starting with version 2.2.0 and prior to version 2.3.1, users who expected their `multiselect` fields to use the field-level access control - if configured - are vulnerable to their field-level access control not being used. List-level access control is not affected. Field-level access control for fields other than `multiselect` are not affected. Version 2.3.1 contains a fix for this issue. As a workaround, stop using the `multiselect` field.
AI-Powered Analysis
Technical Analysis
CVE-2022-39322 is a medium-severity vulnerability affecting the Keystone 6 content management system (CMS) for Node.js, specifically versions from 2.2.0 up to but not including 2.3.1. The vulnerability arises from improper authorization (CWE-285) in the implementation of field-level access control for the `multiselect` field type within the @keystone-6/core package. While list-level access control and field-level access control for other field types remain unaffected, the `multiselect` field does not enforce configured access restrictions properly. This means that users who rely on field-level access control to restrict access to `multiselect` fields may inadvertently expose sensitive data or allow unauthorized modifications through these fields. The issue was resolved in version 2.3.1, and a recommended workaround prior to patching is to avoid using the `multiselect` field altogether. There are no known exploits in the wild at this time, but the vulnerability represents a risk for applications that utilize this specific field type and rely on field-level access control for security. The flaw could allow unauthorized users to read or modify data in `multiselect` fields, potentially leading to data leakage or unauthorized data manipulation within the CMS environment.
Potential Impact
For European organizations using Keystone 6 CMS versions between 2.2.0 and 2.3.0, this vulnerability could lead to unauthorized access or modification of sensitive content managed via `multiselect` fields. This may compromise the confidentiality and integrity of data, especially in sectors where content management systems hold critical or regulated information, such as media, government, education, and healthcare. Unauthorized data exposure could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and potential operational disruptions if data integrity is compromised. Since Keystone is often used in web applications and intranet portals, exploitation could also facilitate further lateral movement or privilege escalation within an organization's infrastructure if combined with other vulnerabilities. Although no known exploits exist currently, the ease of exploitation is moderate because it requires the presence of the vulnerable field type and the absence of other compensating controls. The vulnerability does not affect list-level access control, which may limit the scope somewhat, but organizations relying heavily on field-level controls for granular security are at higher risk.
Mitigation Recommendations
1. Immediate upgrade to Keystone 6 version 2.3.1 or later, where the vulnerability is fixed, is the most effective mitigation. 2. If upgrading is not immediately feasible, remove or replace all `multiselect` fields in the CMS schema to prevent unauthorized access through these fields. 3. Conduct an audit of all content managed via `multiselect` fields to identify potentially exposed sensitive data. 4. Implement additional compensating controls such as web application firewalls (WAFs) with rules to detect anomalous access patterns targeting `multiselect` fields. 5. Review and tighten user roles and permissions to minimize the number of users who can access or modify sensitive fields, especially those using `multiselect`. 6. Monitor logs for unusual access or modification attempts on `multiselect` fields. 7. Educate developers and administrators about this vulnerability to ensure that future schema designs avoid reliance on vulnerable field types without proper access controls. 8. Consider implementing additional application-layer encryption or tokenization for sensitive data stored in CMS fields to reduce impact in case of unauthorized access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6a51
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 11:02:33 PM
Last updated: 8/19/2025, 11:04:57 PM
Views: 17
Related Threats
CVE-2025-54988: CWE-611 Improper Restriction of XML External Entity Reference in Apache Software Foundation Apache Tika PDF parser module
CriticalCVE-2025-9246: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9245: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9244: OS Command Injection in Linksys RE6250
MediumCVE-2025-9241: CSV Injection in elunez eladmin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.