CVE-2024-57190

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-57190
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-57190.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-57190
Aliases
Published
2025-06-10T17:20:38Z
Modified
2025-06-12T17:03:30.622746Z
Summary
[none]
Details

Erxes <1.6.1 is vulnerable to Incorrect Access Control. An attacker can bypass authentication by providing a "User" HTTP header that contains any user, allowing them to talk to any GraphQL endpoint.

References

Affected packages

Git / github.com/erxes/erxes

Affected ranges

Type
GIT
Repo
https://github.com/erxes/erxes
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

%s

0.*

0.1.0
0.1.1
0.10.0
0.10.1
0.11.0
0.11.1
0.11.2
0.12.0
0.12.1
0.13.0
0.14.0
0.14.1
0.14.2
0.15.0
0.15.1
0.15.2
0.15.3
0.15.4
0.15.5
0.16.0
0.17.0
0.17.1
0.17.2
0.17.3
0.17.4
0.17.6
0.18.0
0.18.1
0.18.2
0.19.2
0.19.3
0.2.0
0.2.1
0.20.0
0.20.1
0.20.10
0.20.11
0.20.12
0.20.13
0.20.14
0.20.15
0.20.16
0.20.3
0.20.4
0.20.5
0.20.6
0.20.7
0.20.8
0.20.9
0.21.0
0.21.1
0.22.0
0.22.1
0.22.2
0.22.3
0.23.0
0.24.0
0.24.1
0.24.2
0.3.0
0.3.1
0.4.0
0.4.1
0.4.3
0.4.4
0.4.5
0.4.6
0.4.7
0.5.0
0.5.1
0.6.0
0.6.1
0.7.0
0.8.0
0.8.1
0.8.2
0.8.3
0.9.0
0.9.10
0.9.11
0.9.13
0.9.14
0.9.15
0.9.16
0.9.17
0.9.3
0.9.4
0.9.5
0.9.6
0.9.7
0.9.9

1.*

1.0.0
1.0.1
1.2.0
1.2.1
1.2.3
1.3.0
1.4.0
1.4.0-alpha.0
1.4.0-alpha.1
1.4.0-alpha.2
1.4.0-alpha.3
1.4.0-alpha.4
1.4.0-alpha.5
1.4.0-alpha.6
1.4.0-alpha.7
1.5.0-alpha.0
1.5.0-alpha.1
1.5.0-alpha.2
1.5.1
1.5.10
1.5.2
1.5.3
1.5.4
1.5.5
1.5.6
1.5.7
1.5.8
1.5.9
1.6.0
1.6.0-rc.0
1.6.0-rc.1
1.6.0-rc.2
1.6.0-rc.3
1.6.0-rc.4
1.6.0-rc.5
1.6.0-rc.6
1.6.0-rc.7
1.6.0-rc.8
1.6.1-rc.0
1.6.1-rc.1

v0.*

v0.3.39