Skip to main content

CVE-2023-46942: n/a in n/a

High
VulnerabilityCVE-2023-46942cvecve-2023-46942
Published: Sat Jan 13 2024 (01/13/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Lack of authentication in NPM's package @evershop/evershop before version 1.0.0-rc.8, allows remote attackers to obtain sensitive information via improper authorization in GraphQL endpoints.

AI-Powered Analysis

AILast updated: 07/04/2025, 14:27:20 UTC

Technical Analysis

CVE-2023-46942 is a high-severity vulnerability affecting the NPM package @evershop/evershop prior to version 1.0.0-rc.8. The core issue is a lack of authentication controls on certain GraphQL endpoints, which results in improper authorization. This allows remote attackers to access sensitive information without any authentication or user interaction. The vulnerability is classified under CWE-287, indicating an authentication bypass or missing authentication mechanism. The CVSS v3.1 score of 7.5 reflects that the vulnerability can be exploited remotely over the network with low attack complexity, no privileges required, and no user interaction needed. The impact is primarily on confidentiality, as attackers can retrieve sensitive data, but integrity and availability are not affected. Since the vulnerability resides in a GraphQL API endpoint, it likely exposes data fields or queries that should be restricted to authenticated users. The lack of vendor or product details beyond the NPM package name suggests this vulnerability is specific to the e-commerce framework or platform implemented by @evershop/evershop. No patches or known exploits in the wild have been reported as of the publication date (January 2024).

Potential Impact

For European organizations, especially those using the @evershop/evershop package in their e-commerce platforms, this vulnerability poses a significant risk to the confidentiality of customer and business data. Unauthorized access to sensitive information could lead to data breaches involving personal customer details, transaction records, or proprietary business data. This can result in regulatory non-compliance under GDPR, leading to legal penalties and reputational damage. The vulnerability's remote exploitability without authentication means attackers can scan and target vulnerable endpoints at scale, increasing the risk of widespread data exposure. Organizations relying on this package for online storefronts or backend services may face customer trust erosion and financial losses if exploited. Furthermore, the lack of integrity or availability impact means attackers cannot modify or disrupt services directly, but the confidentiality breach alone is critical in the context of data protection laws prevalent in Europe.

Mitigation Recommendations

1. Immediate upgrade to version 1.0.0-rc.8 or later of the @evershop/evershop package where the authentication issue is resolved. 2. If upgrading is not immediately feasible, implement network-level access controls such as IP whitelisting or VPN restrictions to limit access to GraphQL endpoints. 3. Introduce an authentication proxy or API gateway in front of the GraphQL endpoints to enforce authentication and authorization policies. 4. Conduct a thorough audit of all GraphQL queries and mutations exposed by the application to ensure sensitive data is not accessible without proper authentication. 5. Monitor logs for unusual access patterns or repeated unauthorized queries targeting GraphQL endpoints. 6. Educate development teams on secure GraphQL API design, emphasizing the importance of authentication and authorization checks on all endpoints. 7. Prepare incident response plans for potential data breaches, including notification procedures compliant with GDPR requirements.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-10-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034a182aa0cae27e65f2

Added to database: 6/3/2025, 2:14:34 PM

Last enriched: 7/4/2025, 2:27:20 PM

Last updated: 8/13/2025, 4:53:51 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats