ghsa-428q-q3vv-3fq3
Vulnerability from github
Original message:
I found an issue with security grants on on properties in the GraphQL ItemNormalizer:
If you use something like #[ApiProperty(security: 'is_granted("PROPERTY_READ", [object, property])')]
on a member of an entity, the grant gets cached and is only evaluated once, even if the object
in question is a different one.
There is the ApiPlatform\GraphQl\Serializer\ItemNormalizer::isCacheKeySafe()
method that seems to be intended to prevent this: https://github.com/api-platform/core/blob/88f5ac50d20d6510686a7552310cc567fcca45bf/src/GraphQl/Serializer/ItemNormalizer.php#L160-L164
and in its usage on line 90 it does indeed not create a cache key, but the parent::normalize()
that is called afterwards still creates the cache key and causes the issue.
Impact
It grants access to properties that it should not.
Workarounds
Override the ItemNormalizer.
Patched at: https://github.com/api-platform/core/commit/7af65aad13037d7649348ee3dcd88e084ef771f8
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "api-platform/graphql" }, "ranges": [ { "events": [ { "introduced": "4.0.0-alpha.1" }, { "fixed": "4.0.22" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Packagist", "name": "api-platform/core" }, "ranges": [ { "events": [ { "introduced": "4.0.0-alpha.1" }, { "fixed": "4.0.22" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Packagist", "name": "api-platform/graphql" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.4.17" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Packagist", "name": "api-platform/core" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.4.17" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-31485" ], "database_specific": { "cwe_ids": [ "CWE-696" ], "github_reviewed": true, "github_reviewed_at": "2025-04-04T14:19:42Z", "nvd_published_at": "2025-04-03T20:15:25Z", "severity": "HIGH" }, "details": "### Original message:\n\nI found an issue with security grants on on properties in the GraphQL ItemNormalizer:\n\nIf you use something like `#[ApiProperty(security: \u0027is_granted(\"PROPERTY_READ\", [object, property])\u0027)]` on a member of an entity, the grant gets cached and is only evaluated once, even if the `object` in question is a different one.\n\nThere is the `ApiPlatform\\GraphQl\\Serializer\\ItemNormalizer::isCacheKeySafe()` method that seems to be intended to prevent this: https://github.com/api-platform/core/blob/88f5ac50d20d6510686a7552310cc567fcca45bf/src/GraphQl/Serializer/ItemNormalizer.php#L160-L164 \nand in its usage on line 90 it does indeed not create a cache key, but the `parent::normalize()` that is called afterwards still creates the cache key and causes the issue.\n\n### Impact\n\nIt grants access to properties that it should not.\n\n### Workarounds\n\nOverride the ItemNormalizer.\n\nPatched at: https://github.com/api-platform/core/commit/7af65aad13037d7649348ee3dcd88e084ef771f8", "id": "GHSA-428q-q3vv-3fq3", "modified": "2025-04-08T13:15:08Z", "published": "2025-04-04T14:19:42Z", "references": [ { "type": "WEB", "url": "https://github.com/api-platform/core/security/advisories/GHSA-428q-q3vv-3fq3" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31485" }, { "type": "WEB", "url": "https://github.com/api-platform/core/commit/7af65aad13037d7649348ee3dcd88e084ef771f8" }, { "type": "WEB", "url": "https://github.com/api-platform/core/commit/cba3acfbd517763cf320167250c5bed6d569696a" }, { "type": "PACKAGE", "url": "https://github.com/api-platform/core" }, { "type": "WEB", "url": "https://github.com/api-platform/core/releases/tag/v3.4.17" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "GraphQL grant on a property might be cached with different objects" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.