5.7
CVE-2025-11060
- EPSS 0.05%
- Veröffentlicht 26.09.2025 13:15:41
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
Surrealdb: surrealdb is vulnerable to unauthorized data exposure via live query subscriptions
A flaw was found in the live query subscription mechanism of the database engine. This vulnerability allows record or guest users to observe unauthorized records within the same table, bypassing access controls, via crafted LIVE SELECT subscriptions when other users alter or delete records.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/surrealdb/surrealdb/
≫
Paket
surrealdb
Default Statusunaffected
Version
0
Version <
2.1.9
Status
affected
Version
2.2.0
Version <
2.2.8
Status
affected
Version
2.3.0
Version <
2.3.8
Status
affected
Version
3.3.0
Version <
3.3.0-alpha.7
Status
affected
HerstellerRed Hat
≫
Produkt
OpenShift Service Mesh 3
Default Statusaffected
HerstellerRed Hat
≫
Produkt
OpenShift Service Mesh 3
Default Statusaffected
HerstellerRed Hat
≫
Produkt
OpenShift Service Mesh 3
Default Statusaffected
HerstellerRed Hat
≫
Produkt
OpenShift Service Mesh 3
Default Statusaffected
HerstellerRed Hat
≫
Produkt
OpenShift Service Mesh 3
Default Statusaffected
HerstellerRed Hat
≫
Produkt
OpenShift Service Mesh 3
Default Statusaffected
HerstellerRed Hat
≫
Produkt
OpenShift Service Mesh 3
Default Statusaffected
HerstellerRed Hat
≫
Produkt
OpenShift Service Mesh 3
Default Statusaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.135 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secalert@redhat.com | 5.7 | 2.1 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
|
CWE-863 Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.