Erxes <1.6.1 is vulnerable to Incorrect Access Control. An attacker can bypass authentication by providing a "User" HTTP header that contains any user, allowing them to talk to any GraphQL endpoint.
References
Link | Resource |
---|---|
https://github.com/erxes/erxes/commit/4ed2ca797241d2ba0c9083feeadd9755c1310ce8 | Patch |
https://www.sonarsource.com/blog/micro-services-major-headaches-detecting-vulnerabilities-in-erxes-microservices/ | Exploit Third Party Advisory |
Configurations
History
20 Jun 2025, 13:07
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-10 17:20
Updated : 2025-06-20 13:07
NVD link : CVE-2024-57190
Mitre link : CVE-2024-57190
CVE.ORG link : CVE-2024-57190
JSON object : View
Products Affected
erxes
- erxes
CWE
CWE-284
Improper Access Control