Payload is a free and open source headless content management system. In versions prior to 1.7.0, if a user has access to documents that contain hidden fields or fields they do not have access to, the user could reverse-engineer those values via brute force. Version 1.7.0 contains a patch. As a workaround, write a beforeOperation hook to remove where queries that attempt to access hidden field data.
{
"cna_assigner": "GitHub_M",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/30xxx/CVE-2023-30843.json",
"unresolved_ranges": [
{
"extracted_events": [
{
"fixed": "1.7.0"
}
],
"source": "AFFECTED_FIELD"
}
],
"cwe_ids": [
"CWE-200"
]
}{
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "1.7.0"
}
],
"cpe": "cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:*",
"source": [
"CPE_FIELD",
"REFERENCES"
]
}