CVE-2022-47551

Source
https://cve.org/CVERecord?id=CVE-2022-47551
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-47551.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-47551
Aliases
Published
2022-12-20T00:15:10.050Z
Modified
2025-11-20T12:11:37.081867Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Apiman 1.5.7 through 2.2.3.Final has insufficient checks for read permissions within the Apiman Manager REST API. The root cause of the issue is the Apiman project's accidental acceptance of a large contribution that was not fully compatible with the security model of Apiman versions before 3.0.0.Final. Because of this, 3.0.0.Final is not affected by the vulnerability.

References

Affected packages

Git / github.com/apiman/apiman

Affected ranges

Type
GIT
Repo
https://github.com/apiman/apiman
Events

Affected versions

2.*
2.0.0.Final
2.1.0.Final
2.1.1.Final
2.1.2.Final
2.1.3.Final
2.1.4.Final
2.1.5.Final
2.2.0.Final
2.2.1.Final
2.2.2.Final
2.2.3.Final
apiman-1.*
apiman-1.5.7.Final

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-47551.json"