Tag
Quarkus Vertx HTTP Authorization Bypass via Matrix Parameters
2 rules 2 TTPsQuarkus Vertx HTTP versions < 3.20.6.1, >= 3.21.0 and < 3.27.3.1, >= 3.30.0 and < 3.33.1.1, and >= 3.34.0 and < 3.35.1.1 are vulnerable to an authorization bypass where appending a semicolon and arbitrary text to the request URL allows unauthorized access to protected resources.
WordPress Create DB Tables Plugin Authorization Bypass Vulnerability (CVE-2026-4119)
2 rules 3 TTPs 1 CVEThe Create DB Tables plugin for WordPress versions 1.2.1 and earlier is vulnerable to an authorization bypass, allowing authenticated users to create and delete database tables without proper checks, potentially leading to complete site destruction.
Paperclip codex_local Unauthorized Gmail Access
2 rules 5 TTPsA Paperclip-managed `codex_local` runtime can access and utilize Gmail connectors connected in the ChatGPT/OpenAI apps UI without explicit Paperclip configuration, allowing unauthorized mailbox access and email sending capabilities due to a trust-boundary failure and dangerous default runtime settings.
TREK Travel Planner Missing Authorization Vulnerability (CVE-2026-40185)
2 rules 1 TTP 1 CVE 1 IOCTREK collaborative travel planner before version 2.7.2 is vulnerable to missing authorization checks on the Immich trip photo management routes, potentially allowing unauthorized access to trip photos.
Chartbrew Cross-Tenant Authorization Bypass Vulnerability
2 rules 1 TTP 1 CVEChartbrew versions prior to 4.9.0 are vulnerable to a cross-tenant authorization bypass, allowing an authenticated attacker to access project data belonging to other teams.
Goshs File-Based ACL Authorization Bypass Vulnerability
3 rules 4 TTPs 4 IOCsGoshs is vulnerable to an authorization bypass (CVE-2026-40189) due to inconsistent enforcement of .goshs ACLs on state-changing routes, allowing an unauthenticated attacker to manipulate files within protected directories and bypass authentication barriers.
Decolua 9router Authorization Bypass Vulnerability (CVE-2026-5842)
2 rules 1 TTP 1 CVECVE-2026-5842 is an authorization bypass vulnerability in decolua 9router versions up to 0.3.47, allowing remote attackers to gain unauthorized access via manipulation of the /api endpoint.
File Browser Share Links Accessible After Permission Revocation
3 rules 1 TTP 1 CVEFile Browser share links remain accessible after Share/Download permissions are revoked, allowing continued access to shared files even after an administrator revokes the user's permissions.
ChurchCRM Authenticated API User Authorization Bypass (CVE-2026-39331)
2 rules 1 TTP 1 CVEAn authenticated API user of ChurchCRM prior to v7.1.0 can bypass authorization checks and modify arbitrary family records by manipulating the familyId parameter in API requests, leading to privilege escalation and potential data manipulation.
Windmill Missing Authorization Vulnerability (CVE-2026-22683)
2 rules 2 TTPs 1 CVEWindmill versions 1.56.0 through 1.614.0 contain a missing authorization vulnerability (CVE-2026-22683) that allows users with the Operator role to bypass intended restrictions and perform unauthorized entity creation and modification actions via the backend API, potentially leading to privilege escalation and remote code execution.
Ajenti Authorization Bypass Vulnerability (CVE-2026-35175)
2 rules 1 TTPAjenti versions before 2.2.15 contain an authorization bypass vulnerability that allows authenticated non-superuser users to install custom packages, potentially leading to privilege escalation and system compromise.
SciTokens C++ Authorization Bypass Vulnerability (CVE-2026-32725)
2 rules 1 TTP 1 CVESciTokens C++ library before 1.4.1 is vulnerable to an authorization bypass (CVE-2026-32725) due to improper path normalization, allowing attackers to escalate privileges by using parent-directory traversal in scope claims.
SciTokens Authorization Bypass Vulnerability (CVE-2026-32716)
2 rules 1 TTP 1 CVE 4 IOCsSciTokens versions prior to 1.9.6 incorrectly validate scope paths using a prefix match, leading to an authorization bypass vulnerability where a token with access to a specific path can access sibling paths with the same prefix.
Moby Authorization Plugin Bypass Vulnerability (CVE-2026-34040)
2 rules 2 TTPs 1 CVE 2 IOCsA security vulnerability in Moby (prior to v29.3.1) allows attackers to bypass authorization plugins, potentially leading to unauthorized container access and privilege escalation.
Traefik gRPC Deny Rule Bypass Vulnerability (CVE-2026-33186)
2 rules 1 TTPA remote, unauthenticated attacker can bypass Traefik deny rules by sending malformed gRPC requests with a missing leading slash in the `:path` pseudo-header, exploiting a vulnerability in the gRPC-Go dependency, leading to unauthorized access if a fallback "allow" rule is configured.
OpenEMR Missing Authorization Allows Unauthorized Data Deletion
2 rules 1 TTPOpenEMR versions before 8.0.0.3 contain a missing authorization vulnerability in the AJAX deletion endpoint that allows any authenticated user to delete patient data.
Connect-CMS Improper Authorization Vulnerability (CVE-2026-32299)
2 rules 1 TTP 1 IOCConnect-CMS versions 1.x up to 1.41.0 and 2.x up to 2.41.0 are vulnerable to improper authorization in the page content retrieval feature, potentially allowing retrieval of non-public information, addressed in versions 1.41.1 and 2.41.1.
n8n Credential Authorization Bypass in dynamic-node-parameters Allows Foreign API Key Replay
2 rules 1 TTPA credential authorization bypass vulnerability in n8n versions before 2.18.0 allows an authenticated user with access to a shared workflow to supply a foreign credential ID, causing the backend to decrypt and use that credential against attacker-controlled infrastructure, leading to API key exfiltration.
Heimdall Authorization Bypass via Case-Sensitive URL-Encoded Slash Handling
2 rules 1 TTPHeimdall versions before 0.17.14 are vulnerable to inconsistent path interpretation due to case-sensitive handling of URL-encoded slashes; when `allow_encoded_slashes` is set to `off` (the default), the lowercase `%2f` is not recognized, potentially leading to authorization bypass if the default rule is overly permissive and the upstream service interprets `%2f` as a path separator.
RustFS Notification Target Admin API Authorization Bypass
2 rules 3 TTPsA vulnerability in RustFS allows a non-admin user to overwrite a shared admin-defined notification target, leading to event interception and audit evasion due to missing admin-action authorization on notification target admin API endpoints.
Heimdall Authorization Bypass via Path Normalization Mismatch
2 rules 2 TTPsHeimdall is vulnerable to an authorization bypass due to a path normalization mismatch between Heimdall and downstream components, potentially leading to unauthorized access and privilege escalation.