Search for vulnerabilities
Vulnerability details: VCID-7zuc-x43z-aaaf
Vulnerability ID VCID-7zuc-x43z-aaaf
Aliases CVE-2023-5256
GHSA-rjqg-3h9m-fx5x
Summary In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation. This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API. The core REST and contributed GraphQL modules are not affected.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00777 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00777 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00777 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00777 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00777 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00777 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00777 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00777 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00777 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00996 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01615 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.05285 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-rjqg-3h9m-fx5x
cvssv3.1 6.5 https://github.com/drupal/core
generic_textual CRITICAL https://github.com/drupal/core
generic_textual CRITICAL https://github.com/drupal/core/commit/1cd2741c2b43f6ad1bdfc121b8d9ec3b87e70742
generic_textual CRITICAL https://github.com/drupal/core/commit/5495dc530e3acd056478245bfe1828210c6da7dc
generic_textual CRITICAL https://github.com/drupal/core/commit/d4fe67562ee3ea0d9ecb9672d2945d94c5633d24
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2023-5256
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2023-5256
generic_textual CRITICAL https://www.drupal.org/sa-core-2023-006
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/drupal/core
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-5256
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-5256
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.38944
EPSS Score 0.00089
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.