๐Ÿ” CVE Alert

CVE-2026-33326

MEDIUM 4.3

@keystone-6/core: `isFilterable` bypass via `cursor` parameter in findMany

CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
1th

Keystone is a content management system for Node.js. Prior to version 6.5.2, {field}.isFilterable access control can be bypassed in findMany queries by passing a cursor. This can be used to confirm the existence of records by protected field values. The fix for CVE-2025-46720 (field-level isFilterable bypass for update and delete mutations) added checks to the where parameter in update and delete mutations however the cursor parameter in findMany was not patched and accepts the same UniqueWhere input type. This issue has been patched in version 6.5.2.

CWE CWE-863
Vendor keystonejs
Product keystone
Published Mar 24, 2026
Last Updated Mar 25, 2026
Stay Ahead of the Next One

Get instant alerts for keystonejs keystone

Be the first to know when new medium vulnerabilities affecting keystonejs keystone are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

keystonejs / keystone
< 6.5.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/keystonejs/keystone/security/advisories/GHSA-cgcg-q9jh-5pr2