The Strapi Protected Populate Plugin protects `get` endpoints from revealing too much information. Prior to version 1.3.4, users were able to bypass the field level security. Users who tried to populate something that they didn't have access to could populate those fields anyway. This issue has been patched in version 1.3.4. There are no known workarounds.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-2899 The Strapi Protected Populate Plugin protects `get` endpoints from revealing too much information. Prior to version 1.3.4, users were able to bypass the field level security. Users who tried to populate something that they didn't have access to could populate those fields anyway. This issue has been patched in version 1.3.4. There are no known workarounds.
Github GHSA Github GHSA GHSA-6h67-934r-82g7 Bypass of field access control in strapi-plugin-protected-populate
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T21:23:39.034Z

Reserved: 2023-11-13T13:25:18.479Z

Link: CVE-2023-48218

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-20T17:15:13.543

Modified: 2024-11-21T08:31:13.880

Link: CVE-2023-48218

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.