logo

CVE-2025-22151 strawberry-graphql

Package

Manager: pip
Name: strawberry-graphql
Vulnerable Version: >=0.182.0 <0.257.0

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00056 pctl0.17432

Details

Strawberry GraphQL has type resolution vulnerability in node interface that allows potential data leakage through incorrect type resolution **Vulnerability Summary** A type confusion vulnerability exists in Strawberry GraphQL's relay integration that affects multiple ORM integrations (Django, SQLAlchemy, Pydantic). The vulnerability occurs when multiple GraphQL types are mapped to the same underlying model while using the relay `node` interface. **Affected Components** - Strawberry GraphQL relay integration - Specifically impacts implementations using: - Django integration - SQLAlchemy integration - Pydantic integration **Technical Details** The vulnerability manifests when: 1. Multiple GraphQL types inherit from `relay.Node` 2. These types are mapped to the same database model 3. The global `node` field is used for type resolution Example of vulnerable code: ```python from fruits.models import Fruit import strawberry_django import strawberry @strawberry_django.type(Fruit) class FruitType(relay.Node): name: strawberry.auto @strawberry_django.type(Fruit) class SpecialFruitType(relay.Node): secret_name: strawberry.auto @strawberry.type class Query: node: relay.Node = strawberry_django.node() ``` **Security Impact** When querying for a specific type using the global `node` field (e.g., `FruitType:some-id`), the resolver may incorrectly return an instance of a different type mapped to the same model (e.g., `SpecialFruitType`). This can lead to: 1. Information disclosure if the alternate type exposes sensitive fields 2. Potential privilege escalation if the alternate type contains data intended for restricted access **Note** Even with knowledge of the correct type name (e.g., `SpecialFruitType`), attackers may still be able to access unauthorized data through direct type queries. We recommend to use permission on fields instead of creating a dedicate type. **Recommendations** 1. Avoid mapping multiple relay Node types to the same model 2. Implement strict access controls at the field resolution level (using permissions) 3. Consider using separate models for different access levels of the same data 4. Update to `strawberry-graphql>=0.257.0` 5. If using `strawberry-graphql-django`, update to `strawberry-graphql-django>=0.54.0`

Metadata

Created: 2025-01-09T18:51:51Z
Modified: 2025-01-09T22:04:49Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-5xh2-23cc-5jc6/GHSA-5xh2-23cc-5jc6.json
CWE IDs: ["CWE-351", "CWE-843"]
Alternative ID: GHSA-5xh2-23cc-5jc6
Finding: F113
Auto approve: 1