{"api_version":"1","generated_at":"2026-04-10T14:41:11+00:00","cve":"CVE-2023-26052","urls":{"html":"https://cve.report/CVE-2023-26052","api":"https://cve.report/api/cve/CVE-2023-26052.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-26052","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-26052"},"summary":{"title":"CVE-2023-26052","description":"Saleor is a headless, GraphQL commerce platform delivering personalized shopping experiences. Some internal Python exceptions are not handled properly and thus are returned in API as error messages. Some messages might contain sensitive information like infrastructure details in unauthenticated requests. This issue has been patched in versions 3.1.48, 3.7.59, 3.8.0, 3.9.27, 3.10.14 and 3.11.12.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-03-02 19:15:00","updated_at":"2023-03-13 15:50:00"},"problem_types":["CWE-209"],"metrics":[],"references":[{"url":"https://github.com/saleor/saleor/releases/tag/3.10.14","name":"https://github.com/saleor/saleor/releases/tag/3.10.14","refsource":"MISC","tags":[],"title":"Release 3.10.14 · saleor/saleor · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/saleor/saleor/releases/tag/3.1.48","name":"https://github.com/saleor/saleor/releases/tag/3.1.48","refsource":"MISC","tags":[],"title":"Release 3.1.48 · saleor/saleor · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/saleor/saleor/security/advisories/GHSA-3hvj-3cg9-v242","name":"https://github.com/saleor/saleor/security/advisories/GHSA-3hvj-3cg9-v242","refsource":"MISC","tags":[],"title":"Unauthenticated Information Disclosure Vulnerability via Python Exceptions · Advisory · saleor/saleor · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/saleor/saleor/releases/tag/3.11.12","name":"https://github.com/saleor/saleor/releases/tag/3.11.12","refsource":"MISC","tags":[],"title":"Release 3.11.12 · saleor/saleor · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/saleor/saleor/releases/tag/3.9.27","name":"https://github.com/saleor/saleor/releases/tag/3.9.27","refsource":"MISC","tags":[],"title":"Release 3.9.27 · saleor/saleor · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/saleor/saleor/releases/tag/3.7.59","name":"https://github.com/saleor/saleor/releases/tag/3.7.59","refsource":"MISC","tags":[],"title":"Release 3.7.59 · saleor/saleor · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/saleor/saleor/releases/tag/3.8.30","name":"https://github.com/saleor/saleor/releases/tag/3.8.30","refsource":"MISC","tags":[],"title":"Release 3.8.30 · saleor/saleor · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-26052","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26052","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"26052","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"saleor","cpe5":"saleor","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-26052","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Saleor is a headless, GraphQL commerce platform delivering personalized shopping experiences. Some internal Python exceptions are not handled properly and thus are returned in API as error messages. Some messages might contain sensitive information like infrastructure details in unauthenticated requests. This issue has been patched in versions 3.1.48, 3.7.59, 3.8.0, 3.9.27, 3.10.14 and 3.11.12."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-209: Generation of Error Message Containing Sensitive Information","cweId":"CWE-209"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"saleor","product":{"product_data":[{"product_name":"saleor","version":{"version_data":[{"version_affected":"=","version_value":">= 2.0.0, < 3.1.48"},{"version_affected":"=","version_value":">= 3.11.0, < 3.11.12"},{"version_affected":"=","version_value":">= 3.10.0, < 3.10.14"},{"version_affected":"=","version_value":">= 3.9.0, < 3.9.27"},{"version_affected":"=","version_value":">= 3.8.0, < 3.8.30"},{"version_affected":"=","version_value":">= 3.7.0, < 3.7.59"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/saleor/saleor/releases/tag/3.1.48","refsource":"MISC","name":"https://github.com/saleor/saleor/releases/tag/3.1.48"},{"url":"https://github.com/saleor/saleor/releases/tag/3.10.14","refsource":"MISC","name":"https://github.com/saleor/saleor/releases/tag/3.10.14"},{"url":"https://github.com/saleor/saleor/releases/tag/3.11.12","refsource":"MISC","name":"https://github.com/saleor/saleor/releases/tag/3.11.12"},{"url":"https://github.com/saleor/saleor/releases/tag/3.7.59","refsource":"MISC","name":"https://github.com/saleor/saleor/releases/tag/3.7.59"},{"url":"https://github.com/saleor/saleor/releases/tag/3.8.30","refsource":"MISC","name":"https://github.com/saleor/saleor/releases/tag/3.8.30"},{"url":"https://github.com/saleor/saleor/releases/tag/3.9.27","refsource":"MISC","name":"https://github.com/saleor/saleor/releases/tag/3.9.27"},{"url":"https://github.com/saleor/saleor/security/advisories/GHSA-3hvj-3cg9-v242","refsource":"MISC","name":"https://github.com/saleor/saleor/security/advisories/GHSA-3hvj-3cg9-v242"}]},"source":{"advisory":"GHSA-3hvj-3cg9-v242","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.7,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-03-02 19:15:00","lastModifiedDate":"2023-03-13 15:50:00","problem_types":["CWE-209"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*","versionStartIncluding":"3.11.0","versionEndExcluding":"3.11.12","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10.0","versionEndExcluding":"3.10.14","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*","versionStartIncluding":"3.9.0","versionEndExcluding":"3.9.27","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8.0","versionEndExcluding":"3.8.30","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2.0","versionEndExcluding":"3.7.59","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"3.1.48","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}