When ui.isAccessAllowed is undefined, the adminMeta GraphQL query is publicly accessible, that is to say, no session is required for the query.
This is different to the behaviour of the default AdminUI middleware, which by default will only be publicly accessible if a session strategy is not defined.
This vulnerability does not affect developers using the @keystone-6/auth package, or any users that have written their own ui.isAccessAllowed (that is to say, you are unaffected if ui.isAccessAllowed is defined).
This vulnerability does affect developers who thought that their session strategy will, by default, enforce that adminMeta is inaccessible by the public in accordance with that strategy; akin to the behaviour of the AdminUI middleware.
This vulnerability has been patched in @keystone-6/core version 5.5.1.
You can opt to write your own isAccessAllowed to work-around this vulnerability.
Pull request https://github.com/keystonejs/keystone/pull/8771
{
"cwe_ids": [
"CWE-862"
],
"github_reviewed_at": "2023-08-15T20:04:14Z",
"github_reviewed": true,
"severity": "MODERATE",
"nvd_published_at": "2023-08-15T18:15:10Z"
}