Apiman 1.5.7 through 2.2.3.Final has insufficient checks for read permissions within the Apiman Manager REST API. The root cause of the issue is the Apiman project's accidental acceptance of a large contribution that was not fully compatible with the security model of Apiman versions before 3.0.0.Final. Because of this, 3.0.0.Final is not affected by the vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.apiman.io/blog/permissions-bypass-disclosure/ | Vendor Advisory | 
| https://www.github.com/apiman/apiman | Third Party Advisory | 
| https://www.apiman.io/blog/permissions-bypass-disclosure/ | Vendor Advisory | 
| https://www.github.com/apiman/apiman | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:32
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.apiman.io/blog/permissions-bypass-disclosure/ - Vendor Advisory | |
| References | () https://www.github.com/apiman/apiman - Third Party Advisory | 
Information
                Published : 2022-12-20 00:15
Updated : 2025-04-17 15:15
NVD link : CVE-2022-47551
Mitre link : CVE-2022-47551
CVE.ORG link : CVE-2022-47551
JSON object : View
Products Affected
                apiman
- apiman
CWE
                
                    
                        
                        CWE-276
                        
            Incorrect Default Permissions
