CVE-2026-33326: CWE-863: Incorrect Authorization in keystonejs keystone
CVE-2026-33326 is a medium severity vulnerability in KeystoneJS versions prior to 6. 5. 2 that allows bypassing access control on the isFilterable field during findMany queries by exploiting the cursor parameter. This flaw enables attackers with limited privileges to confirm the existence of records based on protected field values, potentially leaking sensitive information. The vulnerability stems from incomplete patching after a previous related issue (CVE-2025-46720) where update and delete mutations were fixed but the cursor parameter in findMany queries was overlooked. Exploitation requires network access and low privileges but no user interaction. The issue has been fixed in KeystoneJS version 6. 5. 2. Organizations using vulnerable versions should upgrade promptly to prevent unauthorized data exposure.
AI Analysis
Technical Summary
KeystoneJS, a Node.js content management system, suffered from an authorization bypass vulnerability identified as CVE-2026-33326. The vulnerability relates to the isFilterable access control on fields used in findMany queries. Specifically, prior to version 6.5.2, attackers could bypass the isFilterable restriction by passing a specially crafted cursor parameter, which accepts the same UniqueWhere input type as the where parameter. This allowed attackers to confirm the existence of records by querying protected field values, effectively leaking information that should have been restricted. The root cause was an incomplete fix for a prior vulnerability (CVE-2025-46720) that addressed similar bypasses in update and delete mutations but failed to patch the cursor parameter in findMany queries. The vulnerability requires an attacker to have some level of privileges (PR:L) but does not require user interaction (UI:N) and can be exploited remotely (AV:N). The CVSS v3.1 base score is 4.3, reflecting a medium severity due to limited impact on confidentiality and no impact on integrity or availability. The issue was publicly disclosed and patched in KeystoneJS version 6.5.2, with no known exploits in the wild reported at the time of publication.
Potential Impact
The primary impact of this vulnerability is unauthorized information disclosure. Attackers with limited privileges can leverage the cursor parameter in findMany queries to confirm the existence of records containing protected field values, potentially exposing sensitive or confidential data. While the vulnerability does not allow modification or deletion of data, the ability to enumerate protected records can aid in reconnaissance and facilitate further targeted attacks. Organizations using KeystoneJS in environments where sensitive data is managed may face increased risk of data leakage, which could lead to compliance violations, reputational damage, and loss of customer trust. Since the vulnerability requires some level of privilege, the risk is somewhat mitigated but remains significant in multi-tenant or shared environments where privilege boundaries are critical. The lack of known exploits suggests limited active exploitation, but the vulnerability's presence in widely used versions means many deployments could be affected if not patched.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all KeystoneJS installations to version 6.5.2 or later, where the issue has been fully patched. In addition to upgrading, administrators should audit access control policies to ensure that field-level permissions are correctly configured and enforced. Implementing strict privilege separation and minimizing user privileges can reduce the risk of exploitation. Monitoring and logging of findMany queries, especially those using cursor parameters, can help detect suspicious activity indicative of exploitation attempts. If immediate upgrading is not feasible, consider implementing network-level access controls to restrict access to KeystoneJS management interfaces and APIs to trusted users only. Regularly review and apply security advisories from KeystoneJS and related dependencies to stay ahead of emerging vulnerabilities.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, Netherlands, India, Japan, South Korea
CVE-2026-33326: CWE-863: Incorrect Authorization in keystonejs keystone
Description
CVE-2026-33326 is a medium severity vulnerability in KeystoneJS versions prior to 6. 5. 2 that allows bypassing access control on the isFilterable field during findMany queries by exploiting the cursor parameter. This flaw enables attackers with limited privileges to confirm the existence of records based on protected field values, potentially leaking sensitive information. The vulnerability stems from incomplete patching after a previous related issue (CVE-2025-46720) where update and delete mutations were fixed but the cursor parameter in findMany queries was overlooked. Exploitation requires network access and low privileges but no user interaction. The issue has been fixed in KeystoneJS version 6. 5. 2. Organizations using vulnerable versions should upgrade promptly to prevent unauthorized data exposure.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
KeystoneJS, a Node.js content management system, suffered from an authorization bypass vulnerability identified as CVE-2026-33326. The vulnerability relates to the isFilterable access control on fields used in findMany queries. Specifically, prior to version 6.5.2, attackers could bypass the isFilterable restriction by passing a specially crafted cursor parameter, which accepts the same UniqueWhere input type as the where parameter. This allowed attackers to confirm the existence of records by querying protected field values, effectively leaking information that should have been restricted. The root cause was an incomplete fix for a prior vulnerability (CVE-2025-46720) that addressed similar bypasses in update and delete mutations but failed to patch the cursor parameter in findMany queries. The vulnerability requires an attacker to have some level of privileges (PR:L) but does not require user interaction (UI:N) and can be exploited remotely (AV:N). The CVSS v3.1 base score is 4.3, reflecting a medium severity due to limited impact on confidentiality and no impact on integrity or availability. The issue was publicly disclosed and patched in KeystoneJS version 6.5.2, with no known exploits in the wild reported at the time of publication.
Potential Impact
The primary impact of this vulnerability is unauthorized information disclosure. Attackers with limited privileges can leverage the cursor parameter in findMany queries to confirm the existence of records containing protected field values, potentially exposing sensitive or confidential data. While the vulnerability does not allow modification or deletion of data, the ability to enumerate protected records can aid in reconnaissance and facilitate further targeted attacks. Organizations using KeystoneJS in environments where sensitive data is managed may face increased risk of data leakage, which could lead to compliance violations, reputational damage, and loss of customer trust. Since the vulnerability requires some level of privilege, the risk is somewhat mitigated but remains significant in multi-tenant or shared environments where privilege boundaries are critical. The lack of known exploits suggests limited active exploitation, but the vulnerability's presence in widely used versions means many deployments could be affected if not patched.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all KeystoneJS installations to version 6.5.2 or later, where the issue has been fully patched. In addition to upgrading, administrators should audit access control policies to ensure that field-level permissions are correctly configured and enforced. Implementing strict privilege separation and minimizing user privileges can reduce the risk of exploitation. Monitoring and logging of findMany queries, especially those using cursor parameters, can help detect suspicious activity indicative of exploitation attempts. If immediate upgrading is not feasible, consider implementing network-level access controls to restrict access to KeystoneJS management interfaces and APIs to trusted users only. Regularly review and apply security advisories from KeystoneJS and related dependencies to stay ahead of emerging vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-18T21:23:36.678Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c2e66df4197a8e3b68b9a4
Added to database: 3/24/2026, 7:30:53 PM
Last enriched: 3/31/2026, 8:22:56 PM
Last updated: 5/8/2026, 11:45:04 AM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.