// For flags

CVE-2023-25575

Secured properties in API Platform Core may be accessible within collections

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

API Platform Core is the server component of API Platform: hypermedia and GraphQL APIs. Resource properties secured with the `security` option of the `ApiPlatform\Metadata\ApiProperty` attribute can be disclosed to unauthorized users. The problem affects most serialization formats, including raw JSON, which is enabled by default when installing API Platform. Custom serialization formats may also be impacted. Only collection endpoints are affected by the issue, item endpoints are not. The JSON-LD format is not affected by the issue. The result of the security rule is only executed for the first item of the collection. The result of the rule is then cached and reused for the next items. This bug can leak data to unauthorized users when the rule depends on the value of a property of the item. This bug can also hide properties that should be displayed to authorized users. This issue impacts the 2.7, 3.0 and 3.1 branches. Please upgrade to versions 2.7.10, 3.0.12 or 3.1.3. As a workaround, replace the `cache_key` of the context array of the Serializer inside a custom normalizer that works on objects if the security option of the `ApiPlatform\Metadata\ApiProperty` attribute is used.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-02-07 CVE Reserved
  • 2023-02-28 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-09-20 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-842: Placement of User into Incorrect Group
  • CWE-863: Incorrect Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Api-platform
Search vendor "Api-platform"
Core
Search vendor "Api-platform" for product "Core"
>= 2.6.0 < 2.7.10
Search vendor "Api-platform" for product "Core" and version " >= 2.6.0 < 2.7.10"
-
Affected
Api-platform
Search vendor "Api-platform"
Core
Search vendor "Api-platform" for product "Core"
>= 3.0.0 < 3.0.12
Search vendor "Api-platform" for product "Core" and version " >= 3.0.0 < 3.0.12"
-
Affected
Api-platform
Search vendor "Api-platform"
Core
Search vendor "Api-platform" for product "Core"
>= 3.1.0 < 3.1.3
Search vendor "Api-platform" for product "Core" and version " >= 3.1.0 < 3.1.3"
-
Affected