Vulnerability Description
Gatsby is a framework for building websites. The gatsby-source-wordpress plugin prior to versions 4.0.8 and 5.9.2 leaks .htaccess HTTP Basic Authentication variables into the app.js bundle during build-time. Users who are not initializing basic authentication credentials in the gatsby-config.js are not affected. A patch has been introduced in [email protected] and [email protected] which mitigates the issue by filtering all variables specified in the `auth: { }` section. Users that depend on this functionality are advised to upgrade to the latest release of gatsby-source-wordpress, run `gatsby clean` followed by a `gatsby build`. One may manually edit the app.js file post-build as a workaround.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gatsbyjs | Gatsby-Source-Wordpress | < 4.0.8 |
Related Weaknesses (CWE)
References
- https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-rqjw-p5vr-c695ExploitThird Party Advisory
- https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-rqjw-p5vr-c695ExploitThird Party Advisory
FAQ
What is CVE-2021-32770?
CVE-2021-32770 is a vulnerability with a CVSS score of 7.5 (HIGH). Gatsby is a framework for building websites. The gatsby-source-wordpress plugin prior to versions 4.0.8 and 5.9.2 leaks .htaccess HTTP Basic Authentication variables into the app.js bundle during buil...
How severe is CVE-2021-32770?
CVE-2021-32770 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32770?
Check the references section above for vendor advisories and patch information. Affected products include: Gatsbyjs Gatsby-Source-Wordpress.