fkie_cve-2025-22151
Vulnerability from fkie_nvd
Published
2025-01-09 19:15
Modified
2025-01-09 19:15
Summary
Strawberry GraphQL is a library for creating GraphQL APIs. Starting in 0.182.0 and prior to version 0.257.0, a type confusion vulnerability exists in Strawberry GraphQL's relay integration that affects multiple ORM integrations (Django, SQLAlchemy, Pydantic). The vulnerability occurs when multiple GraphQL types are mapped to the same underlying model while using the relay node interface. When querying for a specific type using the global node field (e.g., FruitType:some-id), the resolver may incorrectly return an instance of a different type mapped to the same model (e.g., SpecialFruitType). This can lead to information disclosure if the alternate type exposes sensitive fields and potential privilege escalation if the alternate type contains data intended for restricted access. This vulnerability is fixed in 0.257.0.
Impacted products
Vendor Product Version



{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Strawberry GraphQL is a library for creating GraphQL APIs. Starting in 0.182.0 and prior to version 0.257.0, a type confusion vulnerability exists in Strawberry GraphQL\u0027s relay integration that affects multiple ORM integrations (Django, SQLAlchemy, Pydantic). The vulnerability occurs when multiple GraphQL types are mapped to the same underlying model while using the relay node interface. When querying for a specific type using the global node field (e.g., FruitType:some-id), the resolver may incorrectly return an instance of a different type mapped to the same model (e.g., SpecialFruitType). This can lead to information disclosure if the alternate type exposes sensitive fields and potential privilege escalation if the alternate type contains data intended for restricted access. This vulnerability is fixed in 0.257.0."
    },
    {
      "lang": "es",
      "value": "Strawberry GraphQL es una librer\u00eda para crear API de GraphQL. A partir de la versi\u00f3n 0.182.0 y antes de la versi\u00f3n 0.257.0, existe una vulnerabilidad de confusi\u00f3n de tipos en la integraci\u00f3n de retransmisi\u00f3n de Strawberry GraphQL que afecta a varias integraciones ORM (Django, SQLAlchemy, Pydantic). La vulnerabilidad se produce cuando se asignan varios tipos de GraphQL al mismo modelo subyacente mientras se utiliza la interfaz del nodo de retransmisi\u00f3n. Al consultar un tipo espec\u00edfico mediante el campo de nodo global (por ejemplo, FruitType:some-id), el solucionador puede devolver incorrectamente una instancia de un tipo diferente asignado al mismo modelo (por ejemplo, SpecialFruitType). Esto puede provocar la divulgaci\u00f3n de informaci\u00f3n si el tipo alternativo expone campos confidenciales y una posible escalada de privilegios si el tipo alternativo contiene datos destinados a un acceso restringido. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 0.257.0."
    }
  ],
  "id": "CVE-2025-22151",
  "lastModified": "2025-01-09T19:15:20.410",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 3.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 1.4,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-01-09T19:15:20.410",
  "references": [
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/strawberry-graphql/strawberry/commit/526eb82b70451c0e59d5a71ae9b7396f59974bd8"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/strawberry-graphql/strawberry/security/advisories/GHSA-5xh2-23cc-5jc6"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.