Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. ezsystems/ezpublish-kernel
  4. ›
  5. CVE-2022-48367

CVE-2022-48367: Access control issue in ezsystems/ezpublish-kernel

March 12, 2023 (updated March 4, 2025)

Access control based on object state is mishandled. This is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.

References

  • developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge
  • github.com/advisories/GHSA-h5v2-wrhp-5v35
  • github.com/ezsystems/ezpublish-kernel
  • github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-5x4f-7xgq-r42x
  • nvd.nist.gov/vuln/detail/CVE-2022-48367

Code Behaviors & Features

Detect and mitigate CVE-2022-48367 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 7.5.0 before 7.5.28

Fixed versions

  • 7.5.28

Solution

Upgrade to version 7.5.28 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-862: Missing Authorization

Source file

packagist/ezsystems/ezpublish-kernel/CVE-2022-48367.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:02 +0000.