Skip to main content

CVE-2022-39322: CWE-285: Improper Authorization in keystonejs keystone

Medium
Published: Tue Oct 25 2022 (10/25/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: keystonejs
Product: keystone

Description

@keystone-6/core is a core package for Keystone 6, a content management system for Node.js. Starting with version 2.2.0 and prior to version 2.3.1, users who expected their `multiselect` fields to use the field-level access control - if configured - are vulnerable to their field-level access control not being used. List-level access control is not affected. Field-level access control for fields other than `multiselect` are not affected. Version 2.3.1 contains a fix for this issue. As a workaround, stop using the `multiselect` field.

AI-Powered Analysis

AILast updated: 06/21/2025, 23:02:33 UTC

Technical Analysis

CVE-2022-39322 is a medium-severity vulnerability affecting the Keystone 6 content management system (CMS) for Node.js, specifically versions from 2.2.0 up to but not including 2.3.1. The vulnerability arises from improper authorization (CWE-285) in the implementation of field-level access control for the `multiselect` field type within the @keystone-6/core package. While list-level access control and field-level access control for other field types remain unaffected, the `multiselect` field does not enforce configured access restrictions properly. This means that users who rely on field-level access control to restrict access to `multiselect` fields may inadvertently expose sensitive data or allow unauthorized modifications through these fields. The issue was resolved in version 2.3.1, and a recommended workaround prior to patching is to avoid using the `multiselect` field altogether. There are no known exploits in the wild at this time, but the vulnerability represents a risk for applications that utilize this specific field type and rely on field-level access control for security. The flaw could allow unauthorized users to read or modify data in `multiselect` fields, potentially leading to data leakage or unauthorized data manipulation within the CMS environment.

Potential Impact

For European organizations using Keystone 6 CMS versions between 2.2.0 and 2.3.0, this vulnerability could lead to unauthorized access or modification of sensitive content managed via `multiselect` fields. This may compromise the confidentiality and integrity of data, especially in sectors where content management systems hold critical or regulated information, such as media, government, education, and healthcare. Unauthorized data exposure could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and potential operational disruptions if data integrity is compromised. Since Keystone is often used in web applications and intranet portals, exploitation could also facilitate further lateral movement or privilege escalation within an organization's infrastructure if combined with other vulnerabilities. Although no known exploits exist currently, the ease of exploitation is moderate because it requires the presence of the vulnerable field type and the absence of other compensating controls. The vulnerability does not affect list-level access control, which may limit the scope somewhat, but organizations relying heavily on field-level controls for granular security are at higher risk.

Mitigation Recommendations

1. Immediate upgrade to Keystone 6 version 2.3.1 or later, where the vulnerability is fixed, is the most effective mitigation. 2. If upgrading is not immediately feasible, remove or replace all `multiselect` fields in the CMS schema to prevent unauthorized access through these fields. 3. Conduct an audit of all content managed via `multiselect` fields to identify potentially exposed sensitive data. 4. Implement additional compensating controls such as web application firewalls (WAFs) with rules to detect anomalous access patterns targeting `multiselect` fields. 5. Review and tighten user roles and permissions to minimize the number of users who can access or modify sensitive fields, especially those using `multiselect`. 6. Monitor logs for unusual access or modification attempts on `multiselect` fields. 7. Educate developers and administrators about this vulnerability to ensure that future schema designs avoid reliance on vulnerable field types without proper access controls. 8. Consider implementing additional application-layer encryption or tokenization for sensitive data stored in CMS fields to reduce impact in case of unauthorized access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-02T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6a51

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 11:02:33 PM

Last updated: 8/19/2025, 11:04:57 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats