Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://github.com/saleor/saleor/releases/tag/3.11.12", "name": "https://github.com/saleor/saleor/releases/tag/3.11.12", "tags": ["Release Notes"], "refsource": "MISC"}, {"url": "https://github.com/saleor/saleor/releases/tag/3.7.59", "name": "https://github.com/saleor/saleor/releases/tag/3.7.59", "tags": ["Release Notes"], "refsource": "MISC"}, {"url": "https://github.com/saleor/saleor/releases/tag/3.9.27", "name": "https://github.com/saleor/saleor/releases/tag/3.9.27", "tags": ["Release Notes"], "refsource": "MISC"}, {"url": "https://github.com/saleor/saleor/commit/31bce881ccccf0d79a9b14ecb6ca3138d1edeec1", "name": "https://github.com/saleor/saleor/commit/31bce881ccccf0d79a9b14ecb6ca3138d1edeec1", "tags": ["Patch"], "refsource": "MISC"}, {"url": "https://github.com/saleor/saleor/security/advisories/GHSA-r8qr-wwg3-2r85", "name": "https://github.com/saleor/saleor/security/advisories/GHSA-r8qr-wwg3-2r85", "tags": ["Vendor Advisory"], "refsource": "MISC"}, {"url": "https://github.com/saleor/saleor/releases/tag/3.1.48", "name": "https://github.com/saleor/saleor/releases/tag/3.1.48", "tags": ["Release Notes"], "refsource": "MISC"}, {"url": "https://github.com/saleor/saleor/releases/tag/3.8.30", "name": "https://github.com/saleor/saleor/releases/tag/3.8.30", "tags": ["Release Notes"], "refsource": "MISC"}, {"url": "https://github.com/saleor/saleor/releases/tag/3.10.14", "name": "https://github.com/saleor/saleor/releases/tag/3.10.14", "tags": ["Release Notes"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Saleor is a headless, GraphQL commerce platform delivering personalized shopping experiences. Some internal Python exceptions are not handled properly and thus are returned in API as error messages. Some messages might contain sensitive information like user email address in staff-authenticated requests."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-209"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2023-26051", "ASSIGNER": "security-advisories@github.com"}}, "impact": {"baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 4.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 1.4, "exploitabilityScore": 2.8}}, "publishedDate": "2023-03-02T19:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "3.11.12", "versionStartIncluding": "3.11.0"}, {"cpe23Uri": "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "3.10.14", "versionStartIncluding": "3.10.0"}, {"cpe23Uri": "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "3.9.27", "versionStartIncluding": "3.9.0"}, {"cpe23Uri": "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "3.8.30", "versionStartIncluding": "3.8.0"}, {"cpe23Uri": "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "3.7.59", "versionStartIncluding": "3.2.0"}, {"cpe23Uri": "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "3.1.48", "versionStartIncluding": "2.0.0"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2023-03-13T15:30Z"}