Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-24136

CVE-2026-24136: Saleor E-Commerce IDOR Vulnerability

CVE-2026-24136 is an Insecure Direct Object Reference vulnerability in Saleor e-commerce platform that allows unauthenticated attackers to extract sensitive PII data. This article covers technical details, affected versions, and mitigation.

Published: January 30, 2026

CVE-2026-24136 Overview

CVE-2026-24136 is an Insecure Direct Object Reference (IDOR) vulnerability discovered in Saleor, a popular open-source e-commerce platform. This vulnerability allows unauthenticated actors to extract sensitive information in plain text by exploiting inadequate access controls in the GraphQL API. The flaw affects multiple version branches of Saleor and poses a significant risk to customer personally identifiable information (PII) stored in order records.

Critical Impact

Unauthenticated attackers can exfiltrate sensitive customer PII including order details from Saleor e-commerce installations without any authentication, potentially exposing customer data from orders created before version 3.2.0.

Affected Products

  • Saleor versions 3.2.0 through 3.20.109
  • Saleor versions 3.21.0-a.0 through 3.21.44
  • Saleor versions 3.22.0-a.0 through 3.22.28

Discovery Timeline

  • January 24, 2026 - CVE-2026-24136 published to NVD
  • January 26, 2026 - Last updated in NVD database

Technical Details for CVE-2026-24136

Vulnerability Analysis

This vulnerability is classified as CWE-639 (Authorization Bypass Through User-Controlled Key), commonly known as an Insecure Direct Object Reference (IDOR). The flaw exists in how Saleor handles authorization checks for the order() GraphQL query endpoint. The platform fails to properly verify that the requesting user has legitimate access to the order information being requested, allowing any unauthenticated actor to query arbitrary order data.

The network-accessible nature of this vulnerability means attackers can exploit it remotely without requiring any prior authentication or special privileges. No user interaction is needed for successful exploitation, making this vulnerability particularly dangerous for publicly-accessible Saleor deployments.

Root Cause

The root cause of this vulnerability lies in missing or inadequate authorization checks within Saleor's GraphQL API layer. Specifically, the order() query does not properly validate whether the requesting user is authorized to access the specific order being queried. This allows attackers to enumerate and retrieve order records by manipulating object identifiers, bypassing the intended access control mechanisms.

Orders created prior to Saleor version 3.2.0 are particularly vulnerable as they may contain PII that was stored without the protections introduced in later versions.

Attack Vector

The attack leverages Saleor's GraphQL API, which is accessible over the network. An attacker can craft malicious GraphQL queries targeting the order() endpoint, supplying arbitrary order identifiers to retrieve sensitive information. The attack flow typically involves:

  1. Identifying a Saleor e-commerce installation with an exposed GraphQL endpoint
  2. Crafting GraphQL queries targeting the order() query with enumerated or guessed order identifiers
  3. Extracting sensitive customer PII including names, addresses, contact information, and order details in plain text
  4. Repeating the process to exfiltrate data from multiple orders

Since no authentication is required, attackers can automate this process to systematically extract large volumes of customer data. For technical details on the vulnerability mechanism, refer to the GitHub Security Advisory GHSA-r6fj-f4r9-36gr.

Detection Methods for CVE-2026-24136

Indicators of Compromise

  • Unusually high volume of GraphQL order() queries from unauthenticated sources
  • Sequential or enumerated order ID patterns in query parameters from single IP addresses
  • GraphQL queries targeting order data without accompanying authentication tokens
  • Anomalous access patterns to order endpoints during non-business hours

Detection Strategies

  • Monitor GraphQL endpoint access logs for unauthenticated requests to the order() query
  • Implement rate limiting detection rules for order-related GraphQL queries
  • Configure SIEM alerts for bulk data extraction patterns from e-commerce endpoints
  • Review web application firewall (WAF) logs for suspicious GraphQL query patterns

Monitoring Recommendations

  • Enable detailed logging for all GraphQL API requests, particularly those accessing sensitive order data
  • Implement anomaly detection for unusual query volumes or patterns against order endpoints
  • Set up alerts for authentication bypass attempts on protected resources
  • Monitor for data exfiltration indicators such as large response payloads to unknown clients

How to Mitigate CVE-2026-24136

Immediate Actions Required

  • Upgrade Saleor to patched versions: 3.22.29, 3.21.45, or 3.20.110 immediately
  • Audit access logs for signs of prior exploitation or unauthorized order data access
  • Review and inventory orders created before version 3.2.0 that may contain exposed PII
  • Notify affected customers if evidence of data exfiltration is discovered

Patch Information

Saleor has released security patches across all affected version branches. Organizations should upgrade to the following versions based on their current deployment:

  • Version 3.22.29 for installations running 3.22.x (see commit aeaced8)
  • Version 3.21.45 for installations running 3.21.x (see commit 9bcd4f9)
  • Version 3.20.110 for installations running 3.20.x (see commit 718ce1b)

Additional commit 5dab185 contains related security fixes. Full details are available in the GitHub Security Advisory.

Workarounds

  • Deploy a Web Application Firewall (WAF) rule to block non-staff users from accessing the order() GraphQL query
  • Implement network-level access controls to restrict GraphQL endpoint access to authenticated sessions only
  • Consider temporarily disabling public access to the GraphQL API until patches can be applied
  • Add custom middleware to enforce authentication on sensitive GraphQL queries as an interim measure
bash
# Example WAF rule concept for blocking unauthenticated order queries
# Specific implementation varies by WAF vendor
# Block GraphQL requests containing "order(" query without valid authentication headers
# Rule: IF request.path contains "/graphql/" 
#       AND request.body contains "order(" 
#       AND request.headers["Authorization"] is empty
#       THEN block request

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechSaleor

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-639
  • Technical References
  • GitHub Commit 5dab185

  • GitHub Commit 718ce1b

  • GitHub Commit 9bcd4f9

  • GitHub Commit aeaced8

  • GitHub Security Advisory GHSA-r6fj-f4r9-36gr
  • Related CVEs
  • CVE-2026-39851: Saleor Information Disclosure Vulnerability

  • CVE-2026-33756: Saleor E-Commerce Platform DoS Vulnerability

  • CVE-2026-35407: Saleor Auth Bypass Vulnerability

  • CVE-2026-35401: Saleor E-Commerce Platform DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English