CVE-2025-58442
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-09

Last updated on: 2025-09-11

Assigner: GitHub, Inc.

Description
Saleor is an e-commerce platform. Starting in version 3.21.0 and prior to version 3.21.16, requesting certain fields in the response of `accountRegister` may result in errors that could unintentionally reveal whether a user with the provided email already exists in Saleor. Version 3.21.16 fixes the issue. As a workaround, rate-limit the mutation to reduce the impact.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-09
Last Modified
2025-09-11
Generated
2026-05-07
AI Q&A
2025-09-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
saleor saleor 3.21.16
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-204 The product provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-58442 is a user enumeration vulnerability in the Saleor e-commerce platform versions 3.21.0 up to but not including 3.21.16. The vulnerability occurs because the accountRegister GraphQL mutation returns different error messages or exposes user IDs depending on whether an email address already exists in the system. This discrepancy allows attackers to determine if a user with a specific email exists by analyzing the mutation's response, effectively leaking user existence information. The issue arises from observable response discrepancies that reveal internal state information to unauthorized actors. The vulnerability was fixed in version 3.21.16 by introducing a flag to mark newly created users and modifying GraphQL resolvers to avoid returning user IDs or sensitive data during registration. [2, 3, 4]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to confirm whether specific email addresses are registered users on your Saleor platform. This user enumeration can lead to privacy violations and targeted attacks such as phishing or credential stuffing. Attackers can collect valid user email lists, which may be used for further malicious activities. Although the vulnerability does not directly affect data integrity or availability, it compromises confidentiality by leaking user existence information. The CVSS score of 5.3 indicates moderate severity. Mitigation involves upgrading to Saleor version 3.21.16 or later, or applying rate-limiting on the accountRegister mutation as a temporary workaround. [2, 1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability can negatively affect compliance with data protection regulations such as GDPR and HIPAA because it allows unauthorized disclosure of user existence information, which is considered personal data. By enabling attackers to enumerate valid user email addresses, it increases the risk of privacy breaches and unauthorized access to personal information. Organizations subject to these regulations must protect user data confidentiality, and this vulnerability represents a failure to adequately safeguard such information. Therefore, until patched, the vulnerability could lead to non-compliance issues related to data confidentiality and breach notification requirements. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by observing the responses of the `accountRegister` GraphQL mutation in Saleor versions >=3.21.0 and <3.21.16. Specifically, sending registration requests with different email addresses and analyzing the error messages or returned data can reveal whether a user with a given email exists. To detect this on your system, you can perform GraphQL mutation requests to the `accountRegister` endpoint with various emails and compare the responses for discrepancies that indicate user enumeration. Example command using curl to test the mutation (replace <URL> with your Saleor GraphQL endpoint): curl -X POST <URL> -H "Content-Type: application/json" -d '{"query": "mutation { accountRegister(input: {email: \"[email protected]\", password: \"Password123!\"}) { user { id email } } }"}' By comparing responses for existing and non-existing emails, you can detect if the vulnerability is present. [2]


What immediate steps should I take to mitigate this vulnerability?

The immediate recommended mitigation is to upgrade Saleor to version 3.21.16 or later, where the vulnerability is fixed. If upgrading immediately is not possible, you should implement rate-limiting on the `accountRegister` mutation to reduce the risk of exploitation by limiting the number of registration attempts and thus reducing the ability to enumerate users. This helps mitigate the impact until the patch can be applied. [2, 1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart