GHSA-2rjv-cv85-xhgm

Suggest an improvement
Source
https://github.com/advisories/GHSA-2rjv-cv85-xhgm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-2rjv-cv85-xhgm/GHSA-2rjv-cv85-xhgm.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-2rjv-cv85-xhgm
Published
2025-08-01T18:15:03Z
Modified
2025-08-01T19:36:53.647860Z
Severity
  • 5.7 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
OpenSearch unauthorized data access on fields protected by field level security if field is a member of an object
Details

Impact

OpenSearch versions 2.19.2 and earlier improperly apply Field Level Security (FLS) rules on fields which are not at the top level of the source document tree (i.e., which are members of a JSON object).

If an FLS exclusion rule (like ~object) is applied to an object valued attribute in a source document, the object is properly removed from the _source document in search and get results. However, any member attribute of that object remains available to search queries. This allows to reconstruct the original field contents using range queries.

Patches

The issue has been resolved in OpenSearch 3.0.0 and OpenSearch 2.19.3.

Workarounds

If FLS exclusion rules are used for object valued attributes (like ~object), add an additional exclusion rule for the members of the object (like ~object.*).

Database specific
{
    "nvd_published_at": null,
    "github_reviewed": true,
    "github_reviewed_at": "2025-08-01T18:15:03Z",
    "severity": "MODERATE",
    "cwe_ids": [
        "CWE-200"
    ]
}
References

Affected packages

Maven / org.opensearch.plugin:opensearch-security

Package

Name
org.opensearch.plugin:opensearch-security
View open source insights on deps.dev
Purl
pkg:maven/org.opensearch.plugin/opensearch-security

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.19.3.0

Affected versions

2.*

2.1.0.0
2.2.0.0
2.2.1.0
2.3.0.0
2.4.0.0
2.4.1.0
2.5.0.0
2.6.0.0
2.7.0.0
2.8.0.0
2.9.0.0
2.10.0.0
2.11.0.0
2.11.1.0
2.12.0.0
2.13.0.0
2.14.0.0
2.15.0.0
2.16.0.0
2.17.0.0
2.17.1.0
2.18.0.0
2.19.0.0
2.19.1.0
2.19.2.0