CVE-2023-26051
Python vulnerability analysis and mitigation

Overview

Saleor, a headless GraphQL commerce platform, was found to have a vulnerability where internal Python exceptions were not properly handled and were returned in API error messages (CVE-2023-26051). The vulnerability was discovered and disclosed on February 3, 2023, affecting all versions of Saleor from 2.0.0 onwards. This security issue primarily impacts staff-authenticated requests where sensitive information like user email addresses could be exposed through error messages (GitHub Advisory).

Technical details

The vulnerability is classified with a CVSS v3.1 base score of 6.5 (Moderate severity) with the following metrics: Network attack vector, Low attack complexity, Low privileges required, No user interaction needed, Unchanged scope, High confidentiality impact, and No impact on integrity or availability (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). The issue is categorized as CWE-209, relating to information exposure through error messages (GitHub Advisory).

Impact

The vulnerability could lead to the disclosure of sensitive information through error messages in staff-authenticated requests. Specifically, internal Python exceptions could reveal sensitive data such as user email addresses and other potentially confidential information (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in multiple versions including 3.11.12, 3.10.14, 3.9.27, 3.8.30, 3.7.59, and 3.1.48. The fix involves proper handling of internal Python exceptions and implementing controls to prevent sensitive information disclosure through error messages. No workarounds were provided for unpatched systems (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66423HIGH7.1
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-66454MEDIUM6.5
  • PythonPython
  • arcade-mcp-server
NoYesDec 02, 2025
CVE-2025-66424MEDIUM6.5
  • PythonPython
  • trytond
NoYesNov 30, 2025
CVE-2025-66422MEDIUM4.3
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-65858LOW3.5
  • PythonPython
  • calibreweb
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management