Erxes <1.6.1 is vulnerable to Incorrect Access Control. An attacker can bypass authentication by providing a "User" HTTP header that contains any user, allowing them to talk to any GraphQL endpoint.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00103}

epss

{'score': 0.00113}


Fri, 20 Jun 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Erxes
Erxes erxes
CPEs cpe:2.3:a:erxes:erxes:*:*:*:*:*:*:*:*
Vendors & Products Erxes
Erxes erxes

Tue, 10 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Jun 2025 17:00:00 +0000

Type Values Removed Values Added
Description Erxes <1.6.1 is vulnerable to Incorrect Access Control. An attacker can bypass authentication by providing a "User" HTTP header that contains any user, allowing them to talk to any GraphQL endpoint.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-06-10T19:40:27.579Z

Reserved: 2025-01-09T00:00:00.000Z

Link: CVE-2024-57190

cve-icon Vulnrichment

Updated: 2025-06-10T19:30:43.183Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-10T17:20:38.540

Modified: 2025-06-20T13:07:32.170

Link: CVE-2024-57190

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-06-24T09:44:13Z