Browse all 8 CVE security advisories affecting keystonejs. AI-powered Chinese analysis, POCs, and references for each vulnerability.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-33326 | @keystone-6/core: `isFilterable` bypass via `cursor` parameter in findMany — keystoneCWE-863 | 4.3 | Medium | 2026-03-24 |
| CVE-2025-46720 | Keystone has an unintended `isFilterable` bypass that can be used as an oracle to match hidden fields — keystoneCWE-203 | 3.1 | Low | 2025-05-05 |
| CVE-2023-40027 | Conditionally missing authorization in @keystone-6/core — keystoneCWE-862 | 3.7 | Low | 2023-08-15 |
| CVE-2023-34247 | @keystone-6/auth Open Redirect vulnerability — keystoneCWE-601 | 6.1 | Medium | 2023-06-13 |
| CVE-2022-39382 | NODE_ENV in Keystone defaults to development with esbuild — keystoneCWE-74 | 9.8 | Critical | 2022-11-03 |
| CVE-2022-39322 | @keystone-6/core vulnerable to field-level access-control bypass for multiselect field — keystoneCWE-285 | 9.1 | Critical | 2022-10-25 |
| CVE-2022-0087 | Cross-site Scripting (XSS) - Reflected in keystonejs/keystone — keystonejs/keystoneCWE-79 | 6.1 | - | 2022-01-11 |
| CVE-2021-32624 | Private Field data leak — keystone-5CWE-200 | 7.5 | High | 2021-05-24 |
This page lists every published CVE security advisory associated with keystonejs. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.