First published: Tue Jul 12 2022(Updated: )
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.31), Mendix Applications using Mendix 8 (All versions < V8.18.18), Mendix Applications using Mendix 9 (All versions < V9.14.0), Mendix Applications using Mendix 9 (V9.12) (All versions < V9.12.2), Mendix Applications using Mendix 9 (V9.6) (All versions < V9.6.12). In case of access to an active user session in an application that is built with an affected version, it’s possible to change that user’s password bypassing password validations within a Mendix application. This could allow to set weak passwords.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mendix | >=7.0.0<7.32.31 | |
Mendix | >=8.0.0<8.18.18 | |
Mendix | >=9.6.0<9.6.12 | |
Mendix | >=9.12.0<9.12.2 | |
Mendix | >=9.13.0<9.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Mendix vulnerability is CVE-2022-31257.
The severity of CVE-2022-31257 is high with a severity value of 7.5.
CVE-2022-31257 affects Mendix 7 (All versions < V7.23.31), Mendix 8 (All versions < V8.18.18), Mendix 9 (All versions < V9.14.0), and Mendix 9 (V9.12) (All versions < V9.12.2).
To fix CVE-2022-31257, update your Mendix application to versions V7.23.31, V8.18.18, V9.14.0, or V9.12.2 depending on the affected version.
You can find more information about CVE-2022-31257 at the following reference: [Siemens ProductCERT](https://cert-portal.siemens.com/productcert/pdf/ssa-433782.pdf).