CVE-2022-43685
Description
CKAN through 2.9.6 account takeovers by unauthenticated users when an existing user id is sent via an HTTP POST request. This allows a user to take over an existing account including superuser accounts.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2022-43685 allows unauthenticated account takeover in CKAN ≤2.9.6 by sending an existing user ID via HTTP POST.
Root
Cause CVE-2022-43685 is a critical authentication bypass vulnerability in CKAN through version 2.9.6. The flaw allows an unauthenticated attacker to take over any existing account, including superuser accounts, simply by sending the target user's ID in an HTTP POST request [1]. The official description confirms that account takeovers can be performed by unauthenticated users [1].
Attack
Vector An attacker does not need to be logged in or possess any prior knowledge beyond a valid user ID. By submitting a crafted HTTP POST request containing that user ID, they can assume control of the corresponding account [1]. The vulnerability is trivially exploitable over the network without any special privileges or user interaction. CKAN is a widely deployed open-source data management system used by numerous government and enterprise organizations [2][4], making the attack surface significant.
Impact
Successful exploitation gives the attacker full access to the compromised account, including any associated datasets, administrative functions, and superuser capabilities [1]. The impact is severe because CKAN powers many official data portals (e.g., data.gov, open.canada.ca, data.humdata.org) [2][4]; a superuser takeover could lead to a complete compromise of the data portal.
Mitigation
The vulnerability affects CKAN through version 2.9.6. Users should upgrade to a patched version as soon as possible. The linked PyPA advisory (PYSEC-2022-42987) confirms the vulnerability and its remediation [3]. Organizations running affected CKAN instances are strongly advised to apply security updates immediately.
- NVD - CVE-2022-43685
- GitHub - ckan/ckan: CKAN is an open-source DMS (data management system) for powering data hubs and data portals. CKAN makes it easy to publish, share and use data. It powers catalog.data.gov, open.canada.ca/data, data.humdata.org among many other sites.
- advisory-database/vulns/ckan/PYSEC-2022-42987.yaml at main · pypa/advisory-database
- CKAN - The open source data management system
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ckanPyPI | < 2.9.7 | 2.9.7 |
Affected products
2- CKAN/CKANdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
0No linked articles in our index yet.