Access Restriction Bypass Affecting gatsby-source-wordpress package, versions <4.0.8 >=5.0.0 <5.9.2
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Threat Intelligence
EPSS
0.28% (69th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-GATSBYSOURCEWORDPRESS-1319669
- published 16 Jul 2021
- disclosed 16 Jul 2021
- credit Unknown
Introduced: 16 Jul 2021
CVE-2021-32770 Open this link in a new tabHow to fix?
Upgrade gatsby-source-wordpress
to version 4.0.8, 5.9.2 or higher.
Overview
gatsby-source-wordpress is a Source data from WordPress in an efficient and scalable way.
Affected versions of this package are vulnerable to Access Restriction Bypass. It leaks .htaccess
HTTP Basic Authentication variables into the app.js
bundle during build-time. Users who are not initializing basic authentication credentials in the gatsby-config.js
are not affected. A patch has been introduced which mitigates the issue by filtering all variables specified in the auth: { }
section.