Skip to content

Commit 683edb6

Browse files
1 parent 0f070d9 commit 683edb6

1 file changed

Lines changed: 12 additions & 3 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-6h7h-m7p5-hjqp/GHSA-6h7h-m7p5-hjqp.json

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,19 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6h7h-m7p5-hjqp",
4-
"modified": "2026-03-30T18:04:10Z",
4+
"modified": "2026-03-31T21:40:41Z",
55
"published": "2026-03-30T18:04:10Z",
66
"aliases": [
77
"CVE-2026-34372"
88
],
99
"summary": "Sulu checks fix permissions for subentities endpoints",
1010
"details": "### Impact\n\nA user which has permission for the Sulu Admin via atleast one role could have access to the subentities of contacts via the admin API without even have permission for contacts.\n\n### Patches\n\nThe issue was patched in release 2.6.22 and 3.0.5.\n\n### Workarounds\n\nCreate a Symfony Request Listener checking the permissions for the specific roles.\n\n### Resources\n\nGithub Advisory: https://github.com/sulu/sulu/security/advisories/GHSA-6h7h-m7p5-hjqp",
11-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
1217
"affected": [
1318
{
1419
"package": {
@@ -54,6 +59,10 @@
5459
"type": "WEB",
5560
"url": "https://github.com/sulu/sulu/security/advisories/GHSA-6h7h-m7p5-hjqp"
5661
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34372"
65+
},
5766
{
5867
"type": "PACKAGE",
5968
"url": "https://github.com/sulu/sulu"
@@ -74,6 +83,6 @@
7483
"severity": "MODERATE",
7584
"github_reviewed": true,
7685
"github_reviewed_at": "2026-03-30T18:04:10Z",
77-
"nvd_published_at": null
86+
"nvd_published_at": "2026-03-31T21:16:29Z"
7887
}
7988
}

0 commit comments

Comments
 (0)