Public state-altering operation
Description
Any route that mutates application data should not be public.
Generally, REST READ
, UPDATE
, DELETE
requests and GraphQL mutations should be protected by an authentication middleware.
Remediation
Restrict access to the route, using an authentication middleware for example.
GraphQL Specific
Apollo
Yoga
Awsappsync
Graphqlgo
Graphqlruby
Hasura
REST Specific
Asp_net
Ruby_on_rails
Next_js
Laravel
Express_js
Django
Symfony
Spring_boot
Flask
Nuxt
Fastapi
Configuration
Identifier:
access_control/public_state_altering_operation
Examples
Ignore this check
checks:
access_control/public_state_altering_operation:
skip: true
Score
- Escape Severity: MEDIUM
Compliance
OWASP: API5:2023
pci: 6.5.10
gdpr: Article-32
soc2: CC1
psd2: Article-95
iso27001: A.14.2
nist: SP800-53
fedramp: AC-6
Classification
- CWE: 306
Score
- CVSS_VECTOR: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:H/RL:O/RC:C
- CVSS_SCORE: 8.7