{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T04:05:52.781","vulnerabilities":[{"cve":{"id":"CVE-2024-29036","sourceIdentifier":"security-advisories@github.com","published":"2024-03-20T21:15:31.817","lastModified":"2025-12-03T19:40:20.967","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Saleor Storefront is software for building e-commerce experiences. Prior to commit 579241e75a5eb332ccf26e0bcdd54befa33f4783, when any user authenticates in the storefront, anonymous users are able to access their data. The session is leaked through cache and can be accessed by anyone. Users should upgrade to a version that incorporates commit 579241e75a5eb332ccf26e0bcdd54befa33f4783 or later to receive a patch. A possible workaround is to temporarily disable authentication by changing the usage of `createSaleorAuthClient()`."},{"lang":"es","value":"Saleor Storefront es un software para crear experiencias de comercio electrónico. Antes del commit 579241e75a5eb332ccf26e0bcdd54befa33f4783, cuando cualquier usuario se autentica en el escaparate, los usuarios anónimos pueden acceder a sus datos. La sesión se filtra a través del caché y cualquiera puede acceder a ella. Los usuarios deben actualizar a una versión que incorpore El commit 579241e75a5eb332ccf26e0bcdd54befa33f4783 o posterior para recibir un parche. Un posible workaround es desactivar temporalmente la autenticación cambiando el uso de `createSaleorAuthClient()`. "}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:saleor:react-storefront:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.2","matchCriteriaId":"A6E6E31A-8912-4AC8-8102-D97681576C93"}]}]}],"references":[{"url":"https://github.com/saleor/auth-sdk/commit/56db13407aa35d00b85ec2df042692edd4aea9da","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/saleor/saleor-docs/pull/1120","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/saleor/storefront/commit/579241e75a5eb332ccf26e0bcdd54befa33f4783","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/saleor/storefront/security/advisories/GHSA-52cq-c7x7-cqw4","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/saleor/auth-sdk/commit/56db13407aa35d00b85ec2df042692edd4aea9da","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/saleor/saleor-docs/pull/1120","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"]},{"url":"https://github.com/saleor/storefront/commit/579241e75a5eb332ccf26e0bcdd54befa33f4783","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/saleor/storefront/security/advisories/GHSA-52cq-c7x7-cqw4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}