CVE-2024-29036

Saleor Storefront session leak in cache

Description

Saleor Storefront is software for building e-commerce experiences. Prior to commit 579241e75a5eb332ccf26e0bcdd54befa33f4783, when any user authenticates in the storefront, anonymous users are able to access their data. The session is leaked through cache and can be accessed by anyone. Users should upgrade to a version that incorporates commit 579241e75a5eb332ccf26e0bcdd54befa33f4783 or later to receive a patch. A possible workaround is to temporarily disable authentication by changing the usage of `createSaleorAuthClient()`.

Category

4.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.21%
Affected: saleor storefront
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-29036?
CVE-2024-29036 has been scored as a medium severity vulnerability.
How to fix CVE-2024-29036?
To fix CVE-2024-29036, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-29036 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-29036 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-29036?
CVE-2024-29036 affects saleor storefront.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.