PyPi: Appwrite

CVE-2023-50974

Safety vulnerability ID: 78712

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jan 09, 2024 Updated at Oct 30, 2025
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of the appwrite (PyPI) and appwrite-cli (npm) packages are vulnerable to Information Disclosure due to hard-coded credential storage with overly permissive file permissions. The login command in the Appwrite CLI stores Appwrite user credentials in the ~/.appwrite/prefs.json file with UNIX file mode 0644, allowing any user on the local system to read sensitive information. An attacker with local access can exploit this by reading the prefs.json file to obtain user credentials, compromising the confidentiality of the Appwrite user account.

Affected package

appwrite

Latest version: 13.5.0

Appwrite is an open-source self-hosted backend server that abstract and simplify complex and repetitive development tasks behind a very simple REST API

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 5.5

CVSS v3 Details

MEDIUM 5.5
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
LOW
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
NONE
Availability Availability (A)
NONE