Vulnerability Description
In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation. This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API. The core REST and contributed GraphQL modules are not affected.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Drupal | Drupal | >= 8.7.0, < 9.5.11 |
Related Weaknesses (CWE)
References
- https://www.drupal.org/sa-core-2023-006Vendor Advisory
- https://www.drupal.org/sa-core-2023-006Vendor Advisory
FAQ
What is CVE-2023-5256?
CVE-2023-5256 is a vulnerability with a CVSS score of 7.5 (HIGH). In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading ...
How severe is CVE-2023-5256?
CVE-2023-5256 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5256?
Check the references section above for vendor advisories and patch information. Affected products include: Drupal Drupal.