Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: rubyPackages_3_1.keystone-engine

Found 2 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2026-33326
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 3 weeks ago
@keystone-6/core: `isFilterable` bypass via `cursor` parameter in findMany

Keystone is a content management system for Node.js. Prior to version 6.5.2, {field}.isFilterable access control can be bypassed in findMany queries by passing a cursor. This can be used to confirm the existence of records by protected field values. The fix for CVE-2025-46720 (field-level isFilterable bypass for update and delete mutations) added checks to the where parameter in update and delete mutations however the cursor parameter in findMany was not patched and accepts the same UniqueWhere input type. This issue has been patched in version 6.5.2.

Affected products

keystone
  • ==< 6.5.2

Matching in nixpkgs

pkgs.keystone

Lightweight multi-platform, multi-architecture assembler framework

Package maintainers

Untriaged
created 1 month, 4 weeks ago
OpenStack Keystone: extremely long passwords can crash Keystone by exhausting …

OpenStack Keystone: extremely long passwords can crash Keystone by exhausting stack space

Affected products

Keystone
  • ==2014.1.3

Matching in nixpkgs

pkgs.keystone

Lightweight multi-platform, multi-architecture assembler framework

Package maintainers