CVE-2024-57190

Erxes <1.6.1 is vulnerable to Incorrect Access Control. An attacker can bypass authentication by providing a "User" HTTP header that contains any user, allowing them to talk to any GraphQL endpoint.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:erxes:erxes:*:*:*:*:*:*:*:*

History

20 Jun 2025, 13:07

Type Values Removed Values Added
References () https://www.sonarsource.com/blog/micro-services-major-headaches-detecting-vulnerabilities-in-erxes-microservices/ - () https://www.sonarsource.com/blog/micro-services-major-headaches-detecting-vulnerabilities-in-erxes-microservices/ - Exploit, Third Party Advisory
References () https://github.com/erxes/erxes/commit/4ed2ca797241d2ba0c9083feeadd9755c1310ce8 - () https://github.com/erxes/erxes/commit/4ed2ca797241d2ba0c9083feeadd9755c1310ce8 - Patch
CPE cpe:2.3:a:erxes:erxes:*:*:*:*:*:*:*:*
First Time Erxes erxes
Erxes

10 Jun 2025, 17:20

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-10 17:20

Updated : 2025-06-20 13:07


NVD link : CVE-2024-57190

Mitre link : CVE-2024-57190


JSON object : View

Products Affected

erxes

  • erxes
CWE

No CWE.