
Cloud Vulnerability DB
A community-led vulnerabilities database
A Cross-Site Request Forgery (CSRF) vulnerability was discovered in Vendure, an e-commerce GraphQL framework, affecting versions prior to 2.0.3. The vulnerability (GHSA-h9wq-xcqx-mqxm) was published on July 11, 2023, and stems from insecure default cookie settings where the SameSite attribute is set to false, inherited from the cookie-session npm package's default configuration (GitHub Advisory).
The vulnerability exists in the @vendure/core npm package's cookie settings implementation. By default, the Cookie settings were insecure due to the SameSite setting being false, which effectively results in no SameSite attribute being set. This configuration originates from the default settings of the cookie-session npm package (GitHub Advisory). The issue was addressed in version 2.0.3 by changing the default SameSite option to 'lax' in the core configuration (Vendure Commit).
The vulnerability affects all API requests in the Vendure framework, potentially exposing the application to Cross-Site Request Forgery attacks. This impacts the security of the e-commerce platform's various APIs and different levels of authorization (GitHub Advisory).
Users can mitigate this vulnerability by either upgrading to version 2.0.3 or later, or by manually setting the authOptions.cookieOptions.sameSite configuration option to 'strict', 'lax', or true. For those unable to upgrade immediately, manually configuring the SameSite attribute serves as an effective workaround (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."