Vulnerabilites related to api-platform - core
CVE-2025-31481 (GCVE-0-2025-31481)
Vulnerability from cvelistv5
Published
2025-04-03 19:20
Modified
2025-04-08 13:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
API Platform Core is a system to create hypermedia-driven REST and GraphQL APIs. Using the Relay special node type you can bypass the configured security on an operation. This vulnerability is fixed in 4.0.22 and 3.4.17.
References
► | URL | Tags |
---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
api-platform | core |
Version: >= 4.0.0, < 4.0.22 Version: < 3.4.17 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31481", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T19:39:57.000917Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-03T19:40:10.582Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "core", "vendor": "api-platform", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.0.22" }, { "status": "affected", "version": "\u003c 3.4.17" } ] } ], "descriptions": [ { "lang": "en", "value": "API Platform Core is a system to create hypermedia-driven REST and GraphQL APIs. Using the Relay special node type you can bypass the configured security on an operation. This vulnerability is fixed in 4.0.22 and 3.4.17." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-08T13:14:36.379Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/api-platform/core/security/advisories/GHSA-cg3c-245w-728m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/api-platform/core/security/advisories/GHSA-cg3c-245w-728m" }, { "name": "https://github.com/api-platform/core/commit/55712452b4f630978537bdb2a07dc958202336bb", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/commit/55712452b4f630978537bdb2a07dc958202336bb" }, { "name": "https://github.com/api-platform/core/commit/60747cc8c2fb855798c923b5537888f8d0969568", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/commit/60747cc8c2fb855798c923b5537888f8d0969568" }, { "name": "https://github.com/api-platform/core/releases/tag/v3.4.17", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/releases/tag/v3.4.17" } ], "source": { "advisory": "GHSA-cg3c-245w-728m", "discovery": "UNKNOWN" }, "title": "GraphQL query operations security can be bypassed" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-31481", "datePublished": "2025-04-03T19:20:22.916Z", "dateReserved": "2025-03-28T13:36:51.297Z", "dateUpdated": "2025-04-08T13:14:36.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-25575 (GCVE-0-2023-25575)
Vulnerability from cvelistv5
Published
2023-02-28 22:21
Modified
2025-03-07 18:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-842 - Placement of User into Incorrect Group
Summary
API Platform Core is the server component of API Platform: hypermedia and GraphQL APIs. Resource properties secured with the `security` option of the `ApiPlatform\Metadata\ApiProperty` attribute can be disclosed to unauthorized users. The problem affects most serialization formats, including raw JSON, which is enabled by default when installing API Platform. Custom serialization formats may also be impacted. Only collection endpoints are affected by the issue, item endpoints are not. The JSON-LD format is not affected by the issue. The result of the security rule is only executed for the first item of the collection. The result of the rule is then cached and reused for the next items. This bug can leak data to unauthorized users when the rule depends on the value of a property of the item. This bug can also hide properties that should be displayed to authorized users. This issue impacts the 2.7, 3.0 and 3.1 branches. Please upgrade to versions 2.7.10, 3.0.12 or 3.1.3. As a workaround, replace the `cache_key` of the context array of the Serializer inside a custom normalizer that works on objects if the security option of the `ApiPlatform\Metadata\ApiProperty` attribute is used.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
api-platform | core |
Version: >= 3.0.0, < 3.0.12 Version: >= 3.1.0, < 3.1.3 Version: >= 2.6.0, < 2.7.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:25:19.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/api-platform/core/security/advisories/GHSA-vr2x-7687-h6qv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/api-platform/core/security/advisories/GHSA-vr2x-7687-h6qv" }, { "name": "https://github.com/api-platform/core/commit/5723d68369722feefeb11e42528d9580db5dd0fb", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/api-platform/core/commit/5723d68369722feefeb11e42528d9580db5dd0fb" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-25575", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-07T18:36:44.785754Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-07T18:36:53.149Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "core", "vendor": "api-platform", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.0.12" }, { "status": "affected", "version": "\u003e= 3.1.0, \u003c 3.1.3" }, { "status": "affected", "version": "\u003e= 2.6.0, \u003c 2.7.10" } ] } ], "descriptions": [ { "lang": "en", "value": "API Platform Core is the server component of API Platform: hypermedia and GraphQL APIs. Resource properties secured with the `security` option of the `ApiPlatform\\Metadata\\ApiProperty` attribute can be disclosed to unauthorized users. The problem affects most serialization formats, including raw JSON, which is enabled by default when installing API Platform. Custom serialization formats may also be impacted. Only collection endpoints are affected by the issue, item endpoints are not. The JSON-LD format is not affected by the issue. The result of the security rule is only executed for the first item of the collection. The result of the rule is then cached and reused for the next items. This bug can leak data to unauthorized users when the rule depends on the value of a property of the item. This bug can also hide properties that should be displayed to authorized users. This issue impacts the 2.7, 3.0 and 3.1 branches. Please upgrade to versions 2.7.10, 3.0.12 or 3.1.3. As a workaround, replace the `cache_key` of the context array of the Serializer inside a custom normalizer that works on objects if the security option of the `ApiPlatform\\Metadata\\ApiProperty` attribute is used." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-842", "description": "CWE-842: Placement of User into Incorrect Group", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-28T22:21:48.730Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/api-platform/core/security/advisories/GHSA-vr2x-7687-h6qv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/api-platform/core/security/advisories/GHSA-vr2x-7687-h6qv" }, { "name": "https://github.com/api-platform/core/commit/5723d68369722feefeb11e42528d9580db5dd0fb", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/commit/5723d68369722feefeb11e42528d9580db5dd0fb" } ], "source": { "advisory": "GHSA-vr2x-7687-h6qv", "discovery": "UNKNOWN" }, "title": "Secured properties in API Platform Core may be accessible within collections" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25575", "datePublished": "2023-02-28T22:21:48.730Z", "dateReserved": "2023-02-07T17:10:00.742Z", "dateUpdated": "2025-03-07T18:36:53.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-1000011 (GCVE-0-2019-1000011)
Vulnerability from cvelistv5
Published
2019-02-04 21:00
Modified
2024-08-05 03:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
API Platform version from 2.2.0 to 2.3.5 contains an Incorrect Access Control vulnerability in GraphQL delete mutations that can result in a user authorized to delete a resource can delete any resource. This attack appears to be exploitable via the user must be authorized. This vulnerability appears to have been fixed in 2.3.6.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:00:19.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/api-platform/core/issues/2364" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/api-platform/core/pull/2441" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2019-01-22T00:00:00", "datePublic": "2019-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "API Platform version from 2.2.0 to 2.3.5 contains an Incorrect Access Control vulnerability in GraphQL delete mutations that can result in a user authorized to delete a resource can delete any resource. This attack appears to be exploitable via the user must be authorized. This vulnerability appears to have been fixed in 2.3.6." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-04T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/issues/2364" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/pull/2441" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2019-01-22T21:21:10.019708", "DATE_REQUESTED": "2019-01-15T15:30:38", "ID": "CVE-2019-1000011", "REQUESTER": "dunglas@gmail.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "API Platform version from 2.2.0 to 2.3.5 contains an Incorrect Access Control vulnerability in GraphQL delete mutations that can result in a user authorized to delete a resource can delete any resource. This attack appears to be exploitable via the user must be authorized. This vulnerability appears to have been fixed in 2.3.6." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/api-platform/core/issues/2364", "refsource": "MISC", "url": "https://github.com/api-platform/core/issues/2364" }, { "name": "https://github.com/api-platform/core/pull/2441", "refsource": "MISC", "url": "https://github.com/api-platform/core/pull/2441" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-1000011", "datePublished": "2019-02-04T21:00:00", "dateReserved": "2019-01-15T00:00:00", "dateUpdated": "2024-08-05T03:00:19.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23204 (GCVE-0-2025-23204)
Vulnerability from cvelistv5
Published
2025-03-24 15:53
Modified
2025-03-24 18:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
API Platform Core is a system to create hypermedia-driven REST and GraphQL APIs. Starting in version 3.3.8, a security check that gets called after GraphQl resolvers is always replaced by another one as there's no break in a clause. As this falls back to `security`, the impact is there only when there's only a security after resolver and none inside security. Version 3.3.15 contains a patch for the issue.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
api-platform | core |
Version: >= 3.3.8, < 3.3.15 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23204", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-24T18:03:40.928908Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-24T18:03:54.959Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "core", "vendor": "api-platform", "versions": [ { "status": "affected", "version": "\u003e= 3.3.8, \u003c 3.3.15" } ] } ], "descriptions": [ { "lang": "en", "value": "API Platform Core is a system to create hypermedia-driven REST and GraphQL APIs. Starting in version 3.3.8, a security check that gets called after GraphQl resolvers is always replaced by another one as there\u0027s no break in a clause. As this falls back to `security`, the impact is there only when there\u0027s only a security after resolver and none inside security. Version 3.3.15 contains a patch for the issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T16:31:46.230Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/api-platform/core/security/advisories/GHSA-7mxx-3cgm-xxv3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/api-platform/core/security/advisories/GHSA-7mxx-3cgm-xxv3" }, { "name": "https://github.com/api-platform/core/pull/6444", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/pull/6444" }, { "name": "https://github.com/api-platform/core/pull/6444/files#diff-09e3c2cfe12a2ce65bd6c983c7ca6bfcf783f852b8d0554bb938e8ebf5e5fa65R56", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/pull/6444/files#diff-09e3c2cfe12a2ce65bd6c983c7ca6bfcf783f852b8d0554bb938e8ebf5e5fa65R56" }, { "name": "https://github.com/api-platform/core/commit/dc4fc84ba93e22b4f44a37e90a93c6d079c1c620", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/commit/dc4fc84ba93e22b4f44a37e90a93c6d079c1c620" }, { "name": "https://github.com/soyuka/core/blob/7e2e8f9ff322ac5f6eb5f65baf432bffdca0fd51/src/Symfony/Security/State/AccessCheckerProvider.php#L49-L57", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/soyuka/core/blob/7e2e8f9ff322ac5f6eb5f65baf432bffdca0fd51/src/Symfony/Security/State/AccessCheckerProvider.php#L49-L57" } ], "source": { "advisory": "GHSA-7mxx-3cgm-xxv3", "discovery": "UNKNOWN" }, "title": "GraphQl securityAfterResolver not called" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-23204", "datePublished": "2025-03-24T15:53:19.156Z", "dateReserved": "2025-01-13T17:15:41.050Z", "dateUpdated": "2025-03-24T18:03:54.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47639 (GCVE-0-2023-47639)
Vulnerability from cvelistv5
Published
2025-04-03 16:46
Modified
2025-04-03 18:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-209 - Generation of Error Message Containing Sensitive Information
Summary
API Platform Core is a system to create hypermedia-driven REST and GraphQL APIs. From 3.2.0 until 3.2.4, exception messages, that are not HTTP exceptions, are visible in the JSON error response. This vulnerability is fixed in 3.2.5.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
api-platform | core |
Version: >= 3.2.0, < 3.2.5 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-47639", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T18:08:11.190947Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-03T18:08:26.822Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "core", "vendor": "api-platform", "versions": [ { "status": "affected", "version": "\u003e= 3.2.0, \u003c 3.2.5" } ] } ], "descriptions": [ { "lang": "en", "value": "API Platform Core is a system to create hypermedia-driven REST and GraphQL APIs. From 3.2.0 until 3.2.4, exception messages, that are not HTTP exceptions, are visible in the JSON error response. This vulnerability is fixed in 3.2.5." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209: Generation of Error Message Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T16:46:13.632Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/api-platform/core/security/advisories/GHSA-rfw5-cqjj-7v9r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/api-platform/core/security/advisories/GHSA-rfw5-cqjj-7v9r" }, { "name": "https://github.com/api-platform/core/pull/5823", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/pull/5823" }, { "name": "https://github.com/api-platform/core/commit/ba8a7e6538bccebf14c228e43a9339214c4d9201", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/commit/ba8a7e6538bccebf14c228e43a9339214c4d9201" } ], "source": { "advisory": "GHSA-rfw5-cqjj-7v9r", "discovery": "UNKNOWN" }, "title": "API Platform Core can leak exceptions message that may contain sensitive information" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-47639", "datePublished": "2025-04-03T16:46:13.632Z", "dateReserved": "2023-11-07T16:57:49.245Z", "dateUpdated": "2025-04-03T18:08:26.822Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-31485 (GCVE-0-2025-31485)
Vulnerability from cvelistv5
Published
2025-04-03 19:31
Modified
2025-04-08 13:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-696 - Incorrect Behavior Order
Summary
API Platform Core is a system to create hypermedia-driven REST and GraphQL APIs. Prior to 4.0.22 and 3.4.17, a GraphQL grant on a property might be cached with different objects. The ApiPlatform\GraphQl\Serializer\ItemNormalizer::isCacheKeySafe() method is meant to prevent the caching but the parent::normalize method that is called afterwards still creates the cache key and causes the issue. This vulnerability is fixed in 4.0.22 and 3.4.17.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
api-platform | core |
Version: >= 4.0.0-alpha.1, < 4.0.22 Version: < 3.4.17 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31485", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T19:59:34.529256Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-03T19:59:57.790Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "core", "vendor": "api-platform", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0-alpha.1, \u003c 4.0.22" }, { "status": "affected", "version": "\u003c 3.4.17" } ] } ], "descriptions": [ { "lang": "en", "value": "API Platform Core is a system to create hypermedia-driven REST and GraphQL APIs. Prior to 4.0.22 and 3.4.17, a GraphQL grant on a property might be cached with different objects. The ApiPlatform\\GraphQl\\Serializer\\ItemNormalizer::isCacheKeySafe() method is meant to prevent the caching but the parent::normalize method that is called afterwards still creates the cache key and causes the issue. This vulnerability is fixed in 4.0.22 and 3.4.17." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-696", "description": "CWE-696: Incorrect Behavior Order", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-08T13:15:23.510Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/api-platform/core/security/advisories/GHSA-428q-q3vv-3fq3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/api-platform/core/security/advisories/GHSA-428q-q3vv-3fq3" }, { "name": "https://github.com/api-platform/core/commit/7af65aad13037d7649348ee3dcd88e084ef771f8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/commit/7af65aad13037d7649348ee3dcd88e084ef771f8" }, { "name": "https://github.com/api-platform/core/commit/cba3acfbd517763cf320167250c5bed6d569696a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/commit/cba3acfbd517763cf320167250c5bed6d569696a" }, { "name": "https://github.com/api-platform/core/releases/tag/v3.4.17", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/api-platform/core/releases/tag/v3.4.17" } ], "source": { "advisory": "GHSA-428q-q3vv-3fq3", "discovery": "UNKNOWN" }, "title": "GraphQL grant on a property might be cached with different objects" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-31485", "datePublished": "2025-04-03T19:31:46.021Z", "dateReserved": "2025-03-28T13:36:51.298Z", "dateUpdated": "2025-04-08T13:15:23.510Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-02-04 21:29
Modified
2024-11-21 04:17
Severity ?
Summary
API Platform version from 2.2.0 to 2.3.5 contains an Incorrect Access Control vulnerability in GraphQL delete mutations that can result in a user authorized to delete a resource can delete any resource. This attack appears to be exploitable via the user must be authorized. This vulnerability appears to have been fixed in 2.3.6.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/api-platform/core/issues/2364 | Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://github.com/api-platform/core/pull/2441 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/api-platform/core/issues/2364 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/api-platform/core/pull/2441 | Issue Tracking, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
api-platform | core | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:api-platform:core:*:*:*:*:*:*:*:*", "matchCriteriaId": "E395A8F1-71A8-4CC1-9EB4-3F3099B3C3F4", "versionEndIncluding": "2.3.5", "versionStartIncluding": "2.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "API Platform version from 2.2.0 to 2.3.5 contains an Incorrect Access Control vulnerability in GraphQL delete mutations that can result in a user authorized to delete a resource can delete any resource. This attack appears to be exploitable via the user must be authorized. This vulnerability appears to have been fixed in 2.3.6." }, { "lang": "es", "value": "API Platform, desde la versi\u00f3n 2.2.0 hasta la 2.3.5, contiene una vulnerabilidad de control de acceso incorrecto en las mutaciones de borrado de GraphQL que puede resultar en que un usuario autorizado para eliminar un recurso pueda borrar cualquier recurso. El ataque parece ser explotable mediante un usuario autorizado. La vulnerabilidad parece haber sido solucionada en la versi\u00f3n 2.3.6." } ], "id": "CVE-2019-1000011", "lastModified": "2024-11-21T04:17:40.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-04T21:29:01.050", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/api-platform/core/issues/2364" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/api-platform/core/pull/2441" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/api-platform/core/issues/2364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/api-platform/core/pull/2441" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-28 23:15
Modified
2024-11-21 07:49
Severity ?
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
API Platform Core is the server component of API Platform: hypermedia and GraphQL APIs. Resource properties secured with the `security` option of the `ApiPlatform\Metadata\ApiProperty` attribute can be disclosed to unauthorized users. The problem affects most serialization formats, including raw JSON, which is enabled by default when installing API Platform. Custom serialization formats may also be impacted. Only collection endpoints are affected by the issue, item endpoints are not. The JSON-LD format is not affected by the issue. The result of the security rule is only executed for the first item of the collection. The result of the rule is then cached and reused for the next items. This bug can leak data to unauthorized users when the rule depends on the value of a property of the item. This bug can also hide properties that should be displayed to authorized users. This issue impacts the 2.7, 3.0 and 3.1 branches. Please upgrade to versions 2.7.10, 3.0.12 or 3.1.3. As a workaround, replace the `cache_key` of the context array of the Serializer inside a custom normalizer that works on objects if the security option of the `ApiPlatform\Metadata\ApiProperty` attribute is used.
References
▶ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/api-platform/core/commit/5723d68369722feefeb11e42528d9580db5dd0fb | Patch | |
security-advisories@github.com | https://github.com/api-platform/core/security/advisories/GHSA-vr2x-7687-h6qv | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/api-platform/core/commit/5723d68369722feefeb11e42528d9580db5dd0fb | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/api-platform/core/security/advisories/GHSA-vr2x-7687-h6qv | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
api-platform | core | * | |
api-platform | core | * | |
api-platform | core | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:api-platform:core:*:*:*:*:*:*:*:*", "matchCriteriaId": "024903BC-5E39-4043-9DD1-C5A930CC3DF9", "versionEndExcluding": "2.7.10", "versionStartIncluding": "2.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:api-platform:core:*:*:*:*:*:*:*:*", "matchCriteriaId": "86D99A32-DD68-4BC9-B204-26371066E5BD", "versionEndExcluding": "3.0.12", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:api-platform:core:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5D9B7FE-2AD0-4320-9E65-EDB326BF19F3", "versionEndExcluding": "3.1.3", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "API Platform Core is the server component of API Platform: hypermedia and GraphQL APIs. Resource properties secured with the `security` option of the `ApiPlatform\\Metadata\\ApiProperty` attribute can be disclosed to unauthorized users. The problem affects most serialization formats, including raw JSON, which is enabled by default when installing API Platform. Custom serialization formats may also be impacted. Only collection endpoints are affected by the issue, item endpoints are not. The JSON-LD format is not affected by the issue. The result of the security rule is only executed for the first item of the collection. The result of the rule is then cached and reused for the next items. This bug can leak data to unauthorized users when the rule depends on the value of a property of the item. This bug can also hide properties that should be displayed to authorized users. This issue impacts the 2.7, 3.0 and 3.1 branches. Please upgrade to versions 2.7.10, 3.0.12 or 3.1.3. As a workaround, replace the `cache_key` of the context array of the Serializer inside a custom normalizer that works on objects if the security option of the `ApiPlatform\\Metadata\\ApiProperty` attribute is used." } ], "id": "CVE-2023-25575", "lastModified": "2024-11-21T07:49:45.510", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-28T23:15:11.553", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/api-platform/core/commit/5723d68369722feefeb11e42528d9580db5dd0fb" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/api-platform/core/security/advisories/GHSA-vr2x-7687-h6qv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/api-platform/core/commit/5723d68369722feefeb11e42528d9580db5dd0fb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/api-platform/core/security/advisories/GHSA-vr2x-7687-h6qv" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-842" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }