{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-39382","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","dateUpdated":"2025-04-22T16:08:20.892Z","dateReserved":"2022-09-02T00:00:00.000Z","datePublished":"2022-11-03T00:00:00.000Z"},"containers":{"cna":{"title":"NODE_ENV in Keystone defaults to development with esbuild","providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2022-11-03T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Keystone is a headless CMS for Node.js — built with GraphQL and React.`@keystone-6/core@3.0.0 || 3.0.1` users that use `NODE_ENV` to trigger security-sensitive functionality in their production builds are vulnerable to `NODE_ENV` being inlined to `\"development\"` for user code, irrespective of what your environment variables. If you do not use `NODE_ENV` in your user code to trigger security-sensitive functionality, you are not impacted by this vulnerability. Any dependencies that use `NODE_ENV` to trigger particular behaviors (optimizations, security or otherwise) should still respect your environment's configured `NODE_ENV` variable. The application's dependencies, as found in `node_modules` (including `@keystone-6/core`), are typically not compiled as part of this process, and thus should be unaffected. We have tested this assumption by verifying that `NODE_ENV=production yarn keystone start` still uses secure cookies when using `statelessSessions`. This vulnerability has been fixed in @keystone-6/core@3.0.2, regression tests have been added for this vulnerability in #8063."}],"affected":[{"vendor":"keystonejs","product":"keystone","versions":[{"version":">= 3.0.0, < 3.0.2","status":"affected"}]}],"references":[{"url":"https://github.com/keystonejs/keystone/security/advisories/GHSA-25mx-2mxm-6343"},{"url":"https://github.com/keystonejs/keystone/pull/8031/"},{"url":"https://github.com/keystonejs/keystone/pull/8063"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')","cweId":"CWE-74"}]}],"source":{"advisory":"GHSA-25mx-2mxm-6343","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T12:07:41.230Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/keystonejs/keystone/security/advisories/GHSA-25mx-2mxm-6343","tags":["x_transferred"]},{"url":"https://github.com/keystonejs/keystone/pull/8031/","tags":["x_transferred"]},{"url":"https://github.com/keystonejs/keystone/pull/8063","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-22T15:36:33.217408Z","id":"CVE-2022-39382","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-22T16:08:20.892Z"}}]}}