CVE-2025-58442

5.3 MEDIUM

📋 TL;DR

This vulnerability in Saleor e-commerce platform allows attackers to determine whether a specific email address exists in the system by analyzing error responses from the accountRegister mutation. This affects all Saleor deployments running versions 3.21.0 through 3.21.15, potentially enabling user enumeration attacks.

💻 Affected Systems

Products:
  • Saleor
Versions: 3.21.0 through 3.21.15
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using the GraphQL API with accountRegister mutation enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enumerate all registered users in the system, enabling targeted phishing, credential stuffing, or social engineering attacks against known users.

🟠

Likely Case

Attackers will use automated tools to check for existence of specific email addresses, potentially identifying active users for further attacks.

🟢

If Mitigated

With proper rate limiting and monitoring, impact is limited to occasional user enumeration attempts that can be detected and blocked.

🌐 Internet-Facing: HIGH - The accountRegister endpoint is typically internet-facing and accessible to unauthenticated users.
🏢 Internal Only: LOW - This primarily affects customer-facing registration functionality, not internal administrative interfaces.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific GraphQL queries to the accountRegister endpoint and analyzing error responses.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.21.16

Vendor Advisory: https://github.com/saleor/saleor/security/advisories/GHSA-8w67-mfm5-fwx5

Restart Required: Yes

Instructions:

1. Update Saleor to version 3.21.16 or later. 2. Restart the Saleor service. 3. Verify the fix by testing the accountRegister mutation.

🔧 Temporary Workarounds

Rate Limiting

all

Implement rate limiting on the accountRegister mutation to reduce enumeration effectiveness

Configure rate limiting in your API gateway or application firewall

🧯 If You Can't Patch

  • Implement strict rate limiting on the accountRegister endpoint
  • Monitor for unusual patterns of account registration attempts

🔍 How to Verify

Check if Vulnerable:

Test the accountRegister mutation with different email addresses and observe if error responses differ based on email existence

Check Version:

Check Saleor version in admin panel or via API

Verify Fix Applied:

After patching, test that accountRegister returns consistent error responses regardless of email existence

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed accountRegister attempts with different email addresses
  • Unusual patterns of account registration errors

Network Indicators:

  • High volume of GraphQL queries to accountRegister endpoint
  • Patterns suggesting automated user enumeration

SIEM Query:

source="saleor" AND (mutation="accountRegister" OR endpoint="/graphql/") AND status="error" | stats count by email

🔗 References

📤 Share & Export