{"api_version":"1","generated_at":"2026-04-22T22:50:46+00:00","cve":"CVE-2022-39360","urls":{"html":"https://cve.report/CVE-2022-39360","api":"https://cve.report/api/cve/CVE-2022-39360.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-39360","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-39360"},"summary":{"title":"CVE-2022-39360","description":"Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9 single sign on (SSO) users were able to do password resets on Metabase, which could allow a user access without going through the SSO IdP. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase now blocks password reset for all users who use SSO for their Metabase login.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-10-26 19:15:00","updated_at":"2022-10-28 16:29:00"},"problem_types":["CWE-287"],"metrics":[],"references":[{"url":"https://github.com/metabase/metabase/commit/edadf7303c3b068609f57ca073e67885d5c98730","name":"https://github.com/metabase/metabase/commit/edadf7303c3b068609f57ca073e67885d5c98730","refsource":"MISC","tags":[],"title":"Refactor password reset login for SSO users (#25819) (#25826) · metabase/metabase@edadf73 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/metabase/metabase/security/advisories/GHSA-gw4g-ww2m-v7vc","name":"https://github.com/metabase/metabase/security/advisories/GHSA-gw4g-ww2m-v7vc","refsource":"CONFIRM","tags":[],"title":"SSO users able to circumvent IdP login by doing password reset · Advisory · metabase/metabase · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-39360","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39360","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"39360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"metabase","cpe5":"metabase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-39360","STATE":"PUBLIC","TITLE":"Metabase SSO users able to circumvent IdP login by doing password reset"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"metabase","version":{"version_data":[{"version_value":"< 0.41.9"},{"version_value":">= 0.42.0, < 0.42.6"},{"version_value":">= 0.43.0, < 0.43.7"},{"version_value":">= 0.44.0, < 0.44.5"},{"version_value":">= 1.0.0, < 1.41.9"},{"version_value":">= 1.42.0, < 1.42.6"},{"version_value":">= 1.43.0, < 1.43.7"},{"version_value":">= 1.44.0, < 1.44.5"}]}}]},"vendor_name":"metabase"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9 single sign on (SSO) users were able to do password resets on Metabase, which could allow a user access without going through the SSO IdP. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase now blocks password reset for all users who use SSO for their Metabase login."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-304: Missing Critical Step in Authentication"}]},{"description":[{"lang":"eng","value":"CWE-287: Improper Authentication"}]}]},"references":{"reference_data":[{"name":"https://github.com/metabase/metabase/security/advisories/GHSA-gw4g-ww2m-v7vc","refsource":"CONFIRM","url":"https://github.com/metabase/metabase/security/advisories/GHSA-gw4g-ww2m-v7vc"},{"name":"https://github.com/metabase/metabase/commit/edadf7303c3b068609f57ca073e67885d5c98730","refsource":"MISC","url":"https://github.com/metabase/metabase/commit/edadf7303c3b068609f57ca073e67885d5c98730"}]},"source":{"advisory":"GHSA-gw4g-ww2m-v7vc","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-10-26 19:15:00","lastModifiedDate":"2022-10-28 16:29:00","problem_types":["CWE-287"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"1.42.0","versionEndExcluding":"1.42.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"1.43.0","versionEndExcluding":"1.43.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"1.44.0","versionEndExcluding":"1.44.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"0.42.0","versionEndExcluding":"0.42.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"0.43.0","versionEndExcluding":"0.43.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"0.44.0","versionEndExcluding":"0.44.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"1.41.0","versionEndExcluding":"1.41.9","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"0.41.0","versionEndExcluding":"0.41.9","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}