Search for vulnerabilities
Vulnerability details: VCID-dtaz-7qqy-p3gx
Vulnerability ID VCID-dtaz-7qqy-p3gx
Aliases CVE-2023-5256
GHSA-rjqg-3h9m-fx5x
Summary Cache poisoning in drupal/core In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation. This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API. The core REST and contributed GraphQL modules are not affected.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00821 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00821 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00821 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00821 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00821 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00821 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00821 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00821 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00821 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00821 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.00844 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01337 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01337 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01337 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01337 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01337 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01337 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01337 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01337 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01337 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01337 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
epss 0.01337 https://api.first.org/data/v1/epss?cve=CVE-2023-5256
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-rjqg-3h9m-fx5x
generic_textual CRITICAL https://github.com/drupal/core
generic_textual CRITICAL https://github.com/drupal/core/commit/1cd2741c2b43f6ad1bdfc121b8d9ec3b87e70742
generic_textual CRITICAL https://github.com/drupal/core/commit/5495dc530e3acd056478245bfe1828210c6da7dc
generic_textual CRITICAL https://github.com/drupal/core/commit/d4fe67562ee3ea0d9ecb9672d2945d94c5633d24
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2023-5256
generic_textual CRITICAL https://nvd.nist.gov/vuln/detail/CVE-2023-5256
cvssv3.1 7.5 https://www.drupal.org/sa-core-2023-006
generic_textual CRITICAL https://www.drupal.org/sa-core-2023-006
ssvc Track https://www.drupal.org/sa-core-2023-006
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-5256
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://www.drupal.org/sa-core-2023-006
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-23T18:22:43Z/ Found at https://www.drupal.org/sa-core-2023-006
Exploit Prediction Scoring System (EPSS)
Percentile 0.69818
EPSS Score 0.00642
Published At Aug. 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:41:18.376725+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-rjqg-3h9m-fx5x/GHSA-rjqg-3h9m-fx5x.json 37.0.0