Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33326: CWE-863: Incorrect Authorization in keystonejs keystone

0
Medium
VulnerabilityCVE-2026-33326cvecve-2026-33326cwe-863
Published: Tue Mar 24 2026 (03/24/2026, 19:08:05 UTC)
Source: CVE Database V5
Vendor/Project: keystonejs
Product: keystone

Description

CVE-2026-33326 is a medium severity authorization bypass vulnerability in KeystoneJS versions prior to 6. 5. 2. It allows attackers with limited privileges to bypass field-level access controls on filterable fields during findMany queries by exploiting the cursor parameter. This flaw enables confirmation of the existence of records based on protected field values without proper authorization. The vulnerability arises because the cursor parameter was not patched alongside the where parameter in update and delete mutations, allowing unauthorized filtering. No user interaction is required, and the vulnerability can be exploited remotely over the network with low complexity. The issue has been fixed in KeystoneJS version 6. 5. 2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 19:47:50 UTC

Technical Analysis

KeystoneJS is a popular Node.js-based content management system that provides flexible APIs for querying and managing data. Prior to version 6.5.2, KeystoneJS contained an authorization vulnerability identified as CVE-2026-33326 (CWE-863: Incorrect Authorization). The vulnerability specifically affects the findMany query operation when using the cursor parameter. The cursor parameter accepts a UniqueWhere input type, which was not properly validated for access control, unlike the where parameter that was patched in response to a previous vulnerability (CVE-2025-46720). This oversight allows an attacker with at least limited privileges (PR:L) to bypass the isFilterable access control on certain fields by passing a crafted cursor value. Consequently, attackers can confirm the existence of records containing protected field values, potentially leaking sensitive information. The vulnerability does not allow modification or deletion of data, nor does it impact availability, but it compromises confidentiality by exposing protected data existence. The CVSS v3.1 base score is 4.3 (medium severity), reflecting network attack vector, low attack complexity, required privileges, and no user interaction. The issue was addressed in KeystoneJS version 6.5.2 by adding proper authorization checks on the cursor parameter in findMany queries, aligning it with protections on other query parameters.

Potential Impact

This vulnerability primarily impacts the confidentiality of data managed by KeystoneJS instances running versions prior to 6.5.2. Attackers with limited privileges can confirm the existence of records with protected field values, which may aid in reconnaissance and facilitate further targeted attacks or data leakage. While it does not allow direct data modification or deletion, the ability to infer sensitive information can be critical in environments where data privacy is paramount, such as healthcare, finance, or personal data management. Organizations relying on KeystoneJS for content management or backend APIs may face compliance risks if sensitive data exposure occurs. The vulnerability's ease of exploitation over the network and lack of required user interaction increase the risk, especially in multi-tenant or publicly accessible deployments. However, the absence of known exploits in the wild suggests limited active exploitation currently, though this may change post-disclosure. Overall, the impact is moderate but significant enough to warrant prompt remediation.

Mitigation Recommendations

The primary mitigation is to upgrade all KeystoneJS instances to version 6.5.2 or later, where the cursor parameter authorization checks have been properly implemented. For organizations unable to upgrade immediately, it is recommended to implement strict access controls limiting who can perform findMany queries, especially those involving cursor parameters. Monitoring and logging query patterns that use cursor parameters can help detect suspicious activity indicative of exploitation attempts. Additionally, review and tighten field-level access control policies to minimize exposure of sensitive fields as filterable. Employ network segmentation and firewall rules to restrict access to KeystoneJS management interfaces to trusted users only. Regularly audit and test authorization mechanisms in KeystoneJS deployments to ensure no bypasses exist. Finally, stay informed on updates from KeystoneJS and related security advisories to promptly apply patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T21:23:36.678Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2e66df4197a8e3b68b9a4

Added to database: 3/24/2026, 7:30:53 PM

Last enriched: 3/24/2026, 7:47:50 PM

Last updated: 3/24/2026, 8:42:33 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses