Safety vulnerability ID: 54202
The information on this page was manually curated by our Cybersecurity Intelligence Team.
An issue was discovered in Mirumee Saleor 2.x before 2.9.1. Incorrect access control in the checkoutCustomerAttach mutations allows attackers to attach their checkouts to any user ID and consequently leak user data (e.g., name, address, and previous orders of any other customer).
Latest version: 2.10.1
A modular, high performance e-commerce storefront built with GraphQL, Django, and ReactJS.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application