VYPR
High severityNVD Advisory· Published Jul 20, 2023· Updated Oct 24, 2024

CVE-2023-37649

CVE-2023-37649

Description

Incorrect access control in the component /models/Content of Cockpit CMS v2.5.2 allows unauthorized attackers to access sensitive data.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Cockpit CMS v2.5.2 has an IDOR vulnerability in the Content API, allowing unauthorized attackers to access sensitive data by exploiting relational mappings.

Vulnerability

Overview CVE-2023-37649 is an Insecure Direct Object Reference (IDOR) vulnerability in Cockpit CMS v2.5.2, specifically in the /models/Content component. The root cause lies in the Content API's handling of relational mappings: when populating related model data, the API fails to verify whether the requesting user has permission to access those related models. This allows an attacker to bypass intended access controls and retrieve data from any content model in the system [1].

Exploitation

An attacker with network access to the Cockpit CMS admin API can exploit this vulnerability by crafting requests to the /api/content/items/{model} endpoint and manipulating relational field references. Because MongoDB Object IDs are predictable, the attacker can enumerate and fetch content from models they are not authorized to view. No special privileges are required beyond the ability to make authenticated API calls (or possibly unauthenticated access, depending on configuration) [1].

Impact

Successful exploitation leads to unauthorized disclosure of sensitive data stored in any content model, including private collections, user information, or other restricted content. This information disclosure can compromise the confidentiality of the CMS and its managed data.

Mitigation

The vulnerability was patched in Cockpit CMS v2.6.0, which adds proper permission checks when populating relational mappings in the Content API [4]. Users are strongly advised to upgrade to this version or later. No workarounds are documented, but restricting network access to the admin API and implementing additional authentication layers may reduce risk.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
cockpit-hq/cockpitPackagist
< 2.6.02.6.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.