Paperclip Unauthenticated API Access Vulnerability
Paperclip application suffers from multiple unauthenticated API access vulnerabilities allowing attackers to access sensitive data, gather reconnaissance, and potentially bypass authentication.
Paperclip, a software application, contains multiple API endpoints that lack proper authentication checks, even when the application is configured in “authenticated” mode. This vulnerability allows unauthenticated access to sensitive information and functionality. Observed in versions prior to 2026.416.0, the issue impacts the confidentiality and integrity of the application. An attacker can exploit these vulnerabilities to gather reconnaissance information about the deployment, access heartbeat run issues, retrieve agent instructions, and potentially bypass authentication mechanisms via unauthenticated CLI challenge creation. The disclosed information includes API structure, authentication mechanisms, and internal workflows, which can be leveraged for further malicious activities.
Attack Chain
- The attacker sends an unauthenticated GET request to
/api/healthto obtain deployment mode, exposure setting, auth status, version, and feature flags. - The attacker sends an unauthenticated GET request to
/api/skills/indexto retrieve a list of available skill endpoints. - The attacker sends an unauthenticated GET request to
/api/skills/paperclipto leak the agent heartbeat procedure, API endpoints, parameters, authentication mechanisms, and agent coordination protocols. - The attacker sends an unauthenticated GET request to
/api/heartbeat-runs/:runId/issues, attempting to access issue data for a heartbeat run by guessing or obtaining a validrunId. - The attacker sends an unauthenticated POST request to
/api/cli-auth/challengeswith a JSON payload containing a command to create a CLI authentication challenge and obtain aboardApiToken. - The attacker uses the leaked information to map the internal API structure and plan further attacks or unauthorized access.
- The attacker exploits the
boardApiTokenobtained in step 5, combined with open registration (if enabled), to persistently generate API keys.
Impact
This vulnerability results in significant data exposure, including heartbeat run issues, agent instructions, and internal API structure. An attacker can fingerprint the deployment and map the entire internal API for reconnaissance purposes. Successful exploitation of the unauthenticated CLI challenge creation allows for authentication bypass, potentially leading to a full remote code execution chain. The vulnerability affects organizations using Paperclip versions prior to 2026.416.0. A successful attack can compromise sensitive data, facilitate unauthorized access, and lead to further malicious activities.
Recommendation
- Apply the patch to upgrade Paperclip to version 2026.416.0 or later, which addresses the unauthenticated API access vulnerabilities.
- Implement authentication checks for the
/api/heartbeat-runs/:runId/issuesendpoint inserver/src/routes/activity.tsusingassertCompanyAccess. - Implement authentication checks for the
/api/cli-auth/challengesendpoint inserver/src/routes/access.tsusingassertBoard. - Implement authentication checks for the
/api/skills/indexand/api/skills/:skillNameendpoints inserver/src/routes/access.ts. - Reduce the information exposed by the
/api/healthendpoint by removing sensitive data such asdeploymentMode,deploymentExposure, andversionor by requiring authentication viaassertBoard. - Deploy the Sigma rule “Detect Paperclip Unauthenticated Health Endpoint Access” to identify unauthorized access attempts to the
/api/healthendpoint.
Detection coverage 2
Detect Paperclip Unauthenticated Health Endpoint Access
mediumDetects unauthenticated access to the /api/health endpoint, which may indicate reconnaissance activity.
Detect Paperclip Unauthenticated Skill Endpoint Access
mediumDetects unauthenticated access to the /api/skills/index endpoint, which may indicate reconnaissance activity.
Detection queries are kept inside the platform. Get full rules →