Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 26 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Saleor
Saleor saleor |
|
| Vendors & Products |
Saleor
Saleor saleor |
Fri, 23 Jan 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Saleor is an e-commerce platform. Versions 3.2.0 through 3.20.109, 3.21.0-a.0 through 3.21.44 and 3.22.0-a.0 through 3.22.28 have a n Insecure Direct Object Reference (IDOR) vulnerability that allows unauthenticated actors to extract sensitive information in plain text. Orders created before Saleor 3.2.0 could have PIIs exfiltrated. The issue has been patched in Saleor versions: 3.22.29, 3.21.45, and 3.20.110. To workaround, temporarily block non-staff users from fetching order information (the order() GraphQL query) using a WAF. | |
| Title | Saleor has an Insecure Direct Object Reference (IDOR) in GraphQL API | |
| Weaknesses | CWE-639 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-26T17:10:16.445Z
Reserved: 2026-01-21T18:38:22.474Z
Link: CVE-2026-24136
Updated: 2026-01-26T17:10:01.219Z
Status : Awaiting Analysis
Published: 2026-01-24T00:15:49.167
Modified: 2026-01-26T15:03:33.357
Link: CVE-2026-24136
No data.
OpenCVE Enrichment
Updated: 2026-01-26T11:48:59Z