Anonymous Intelligence Signal

P0 Security Alert: IDOR Vulnerabilities Expose User Data Across 15+ Routes in Codebase

human The Lab unverified 2026-03-28 17:27:02 Source: GitHub Issues

A critical security vulnerability allows any authenticated user to access other users' private data by simply guessing record IDs. The flaw stems from over 15 route handlers that fetch records by ID without verifying the requesting user's ownership, creating a direct path to sensitive information across multiple application modules.

The affected routes span core functionalities, including calendar events, offers, automation rules, orders, market intelligence, and financial data. For instance, `calendar.js` executes `SELECT * FROM calendar_events WHERE id = ?` without a `user_id` check, while `financials.js` has multiple similar vulnerabilities for purchases, accounts, and transactions. The pattern is consistent: queries retrieve records based solely on a provided ID, omitting the crucial `AND user_id = ?` clause that would enforce data isolation between users.

This Insecure Direct Object Reference (IDOR) vulnerability is classified as a P0 priority fix. The prescribed remediation is to modify every identified query to include the user ownership check and to return a generic 404 error for mismatched records, preventing information leakage that a 403 error might cause. The exposure of such a fundamental access control flaw across numerous endpoints signals a systemic oversight in the application's security architecture, putting all user data at immediate risk of unauthorized access.