Erxes <1.6.1 is vulnerable to Incorrect Access Control. An attacker can bypass authentication by providing a "User" HTTP header that contains any user, allowing them to talk to any GraphQL endpoint.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://github.com/erxes/erxes/commit/4ed2ca797241d2ba0c9083feeadd9755c1310ce8 | Patch |
| https://www.sonarsource.com/blog/micro-services-major-headaches-detecting-vulnerabilities-in-erxes-microservices/ | Exploit Third Party Advisory |
Configurations
History
20 Jun 2025, 13:07
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.sonarsource.com/blog/micro-services-major-headaches-detecting-vulnerabilities-in-erxes-microservices/ - Exploit, Third Party Advisory | |
| References | () https://github.com/erxes/erxes/commit/4ed2ca797241d2ba0c9083feeadd9755c1310ce8 - Patch | |
| CPE | cpe:2.3:a:erxes:erxes:*:*:*:*:*:*:*:* | |
| First Time |
Erxes erxes
Erxes |
10 Jun 2025, 17:20
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-10 17:20
Updated : 2025-06-20 13:07
NVD link : CVE-2024-57190
Mitre link : CVE-2024-57190
JSON object : View
Products Affected
erxes
- erxes
CWE
No CWE.
