{"api_version":"1","generated_at":"2026-04-22T23:23:10+00:00","cve":"CVE-2020-14388","urls":{"html":"https://cve.report/CVE-2020-14388","api":"https://cve.report/api/cve/CVE-2020-14388.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-14388","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-14388"},"summary":{"title":"CVE-2020-14388","description":"A flaw was found in the Red Hat 3scale API Management Platform, where member permissions for an API's admin portal were not properly enforced. This flaw allows an authenticated user to bypass normal account restrictions and access API services where they do not have permission.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2021-06-02 13:15:00","updated_at":"2022-07-25 11:42:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1875553","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1875553","refsource":"MISC","tags":[],"title":"1875553 – (CVE-2020-14388) CVE-2020-14388 3scale-system: member role permissions bypass when editing services","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-14388","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14388","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"14388","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"3scale_api_management","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2020-14388","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A flaw was found in the Red Hat 3scale API Management Platform, where member permissions for an API's admin portal were not properly enforced. This flaw allows an authenticated user to bypass normal account restrictions and access API services where they do not have permission."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-284","cweId":"CWE-284"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Red Hat 3scale API Management","version":{"version_data":[{"version_affected":"=","version_value":"Red Hat 3scale API Management 2.10.0"}]}}]}}]}},"references":{"reference_data":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1875553","refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1875553"}]}},"nvd":{"publishedDate":"2021-06-02 13:15:00","lastModifiedDate":"2022-07-25 11:42:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW","baseScore":6.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:3scale_api_management:2.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"14388","Ordinal":"175618","Title":"CVE-2020-14388","CVE":"CVE-2020-14388","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"14388","Ordinal":"1","NoteData":"A flaw was found in the Red Hat 3scale API Management Platform, where member permissions for an API's admin portal were not properly enforced. This flaw allows an authenticated user to bypass normal account restrictions and access API services where they do not have permission.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"14388","Ordinal":"2","NoteData":"2021-06-02","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"14388","Ordinal":"3","NoteData":"2021-06-02","Type":"Other","Title":"Modified"}]}}}