Payload is a free and open source headless content management system. In versions prior to 1.7.0, if a user has access to documents that contain hidden fields or fields they do not have access to, the user could reverse-engineer those values via brute force. Version 1.7.0 contains a patch. As a workaround, write a `beforeOperation` hook to remove `where` queries that attempt to access hidden field data.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-1168 Payload is a free and open source headless content management system. In versions prior to 1.7.0, if a user has access to documents that contain hidden fields or fields they do not have access to, the user could reverse-engineer those values via brute force. Version 1.7.0 contains a patch. As a workaround, write a `beforeOperation` hook to remove `where` queries that attempt to access hidden field data.
Github GHSA Github GHSA GHSA-35jj-vqcf-f2jf Hidden fields can be leaked on readable collections in Payload
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 03 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-03T16:45:55.233Z

Reserved: 2023-04-18T16:13:15.880Z

Link: CVE-2023-30843

cve-icon Vulnrichment

Updated: 2024-08-02T14:37:15.432Z

cve-icon NVD

Status : Modified

Published: 2023-04-26T21:15:09.177

Modified: 2024-11-21T08:00:57.300

Link: CVE-2023-30843

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.