CVE-2023-46498
JavaScript vulnerability analysis and mitigation

Overview

An issue in EverShop NPM versions before v.1.0.0-rc.8 was discovered that allows remote attackers to obtain sensitive information and execute arbitrary code. The vulnerability affects the /deleteCustomer/route.json file and was disclosed on December 8, 2023. The issue has been assigned CVE-2023-46498 and received a CVSS v3.1 base score of 9.8 (CRITICAL) (NVD).

Technical details

The vulnerability is classified as a Broken Function Level Authorization issue in the route.json file. Unauthenticated attackers can exploit this vulnerability through a publicly accessible GraphQL endpoint. The attack can be chained with another vulnerability in the GraphQL schema, where attackers first query the schema to identify the Customer object and obtain the relevant uuid of a user. Subsequently, they can send a DELETE request to the unprotected endpoint, resulting in successful deletion of user accounts. The attack complexity is rated as LOW, requiring no user interaction or special privileges (Checkmarx Advisory).

Impact

The vulnerability has severe impacts on system security. It allows attackers to execute arbitrary code and obtain sensitive information. According to the CVSS metrics, the vulnerability has HIGH impact on availability and integrity, potentially affecting system operations and data integrity. The scope is rated as UNCHANGED, meaning the vulnerable component and the impacted component are the same (NVD).

Mitigation and workarounds

The vulnerability has been fixed in EverShop NPM version 1.0.0-rc.8. The fix involves closing public access to the endpoint, requiring users to be authenticated with 'admin' credentials to make requests. Organizations using affected versions should upgrade to the patched version immediately (Checkmarx Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-69264HIGH8.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69262HIGH7.5
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69263HIGH7.5
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2026-22028HIGH7.2
  • JavaScriptJavaScript
  • preact
NoYesJan 07, 2026
CVE-2025-9611HIGH7.2
  • JavaScriptJavaScript
  • @playwright/mcp
NoYesJan 07, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management