Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2138 articles · 105948 vulns · 36/41 feeds (7d)
← Back to list
4.3
CVE-2026-33326PATCHED
null · keystone

Keystone is a content management system for Node.js. Prior to version 6.5.2, {field}.isFilterable access control can be bypassed in findMany queries by passing a cursor. This can be used to confirm th

Description

Keystone is a content management system for Node.js. Prior to version 6.5.2, {field}.isFilterable access control can be bypassed in findMany queries by passing a cursor. This can be used to confirm the existence of records by protected field values. The fix for CVE-2025-46720 (field-level isFilterable bypass for update and delete mutations) added checks to the where parameter in update and delete mutations however the cursor parameter in findMany was not patched and accepts the same UniqueWhere input type. This issue has been patched in version 6.5.2.

Affected Products

VendorProductVersions
nullkeystonenpm/@keystone-6/core: <= 6.5.1

References

  • https://github.com/keystonejs/keystone/security/advisories/GHSA-cgcg-q9jh-5pr2
CVSS 3.14.3 MEDIUM
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CISA KEV❌ No
Actively exploited❌ No
Patch available@keystone-6/core@6.5.2
CWECWE-863
PublishedMar 24, 2026
Last enriched4d ago
Trending Score0
Source articles0
Independent0
Info Completeness5/14
Missing: vendor, product, versions, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-28505EXP
Tautulli: RCE via eval() sandbox bypass using lambda nested scope to escape co_names whitelist check
Trending: 63
CRITICALCVE-2026-31804EXP
Tautulli: Unauthenticated pms_image_proxy endpoint proxies arbitrary HTTP requests through the Plex Media Server
Trending: 50
HIGHCVE-2026-32275EXP
Tautulli: Unsanitized JSONP callback parameter allows cross-origin script injection and API key theft
Trending: 47
HIGHCVE-2026-31831EXP
Tautulli: Unauthenticated Path Traversal in `/newsletter/image/images` endpoint
Trending: 47
CRITICALCVE-2026-31799
Tautulli: SQL Injection in get_home_stats API endpoint via unsanitised filter parameters
Trending: 38

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Mar 24, 2026
Patch Available
Mar 25, 2026
Discovered by ZDM
Mar 26, 2026