WhisperX tag archive

#IDOR

This page collects WhisperX intelligence signals tagged #IDOR. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (16)

The Lab · 2026-03-28 17:27:02 · GitHub Issues

1. P0 Security Alert: IDOR Vulnerabilities Expose User Data Across 15+ Routes in Codebase

A critical security vulnerability allows any authenticated user to access other users' private data by simply guessing record IDs. The flaw stems from over 15 route handlers that fetch records by ID without verifying the requesting user's ownership, creating a direct path to sensitive information across multiple applic...

The Lab · 2026-04-03 13:27:01 · GitHub Issues

2. OpenSchoolEd: IDOR Flaws Expose Student Data in Discipline, Billing, and Gradebook Modules

A critical security vulnerability pattern has been identified within the OpenSchoolEd platform, exposing student data to unauthorized access and manipulation. The flaw is an Insecure Direct Object Reference (IDOR) affecting core administrative functions. While view and list operations correctly restrict data based on u...

The Lab · 2026-04-03 14:27:09 · GitHub Issues

3. SECURITY CRITICAL: API Exposes IDOR Flaw, Allowing Any User to Hijack Others' Favorites

A critical security vulnerability in a web application's API allows any authenticated user to impersonate any other user, granting unauthorized access to create, delete, and query personal favorites. The flaw, a classic Broken Object Level Authorization (BOLA/IDOR) issue, stems from a fundamental authentication bypass ...

The Lab · 2026-04-03 20:27:07 · GitHub Issues

4. GitHub Security Alert: High-Severity IDOR Exposes All User Accounts to Unauthorized Access

A critical security vulnerability has been exposed in a codebase, allowing any authenticated user to access, modify, or delete the bank accounts of any other user. The flaw is a classic Insecure Direct Object Reference (IDOR) vulnerability, classified as CWE-639 (Authorization Bypass Through User-Controlled Key). The e...

The Lab · 2026-04-11 04:22:32 · GitHub Issues

5. Nightly AI Pentest Fails, Exposing Unresolved High-Severity IDOR Flaws in Payment System

A nightly automated security audit has failed, leaving multiple critical access control vulnerabilities unaddressed in a payment processing system. The failure of the 'Pentest' workflow means no new vulnerabilities were discovered, but more critically, it highlights a set of known, high-severity flaws that remain open ...

The Lab · 2026-04-11 22:22:24 · GitHub Issues

6. GitHub Security Alert: EditSelf Permission Exposes IDOR Vulnerability in User Management System

A critical security flaw has been exposed in a user management system's `EditSelf` permission, allowing any authenticated user to potentially read any person's record via an API endpoint. The vulnerability, tracked as GHSA-5w59-32c8-933v, stems from the API's failure to enforce proper scoping for the permission, which ...

The Lab · 2026-04-15 02:22:31 · GitHub Issues

7. Nightly AI Agent Exposes Critical Security Gaps: IDOR Flaws, Incomplete Pentest Configs

A nightly AI security agent has flagged multiple high-severity vulnerabilities in a software project's test suite and configuration, revealing a pattern of insufficient security coverage. The automated report, generated on April 15, 2026, identified five critical gaps, including a high-risk Insecure Direct Object Refer...

The Lab · 2026-04-15 22:22:54 · GitHub Issues

8. Sentinel Exposes Critical IDOR Flaw in Order-Validate Endpoint, Enabling User Spoofing

A critical security vulnerability was discovered and patched in the `order-validate` endpoint, exposing a severe authentication bypass. The flaw was an Insecure Direct Object Reference (IDOR) combined with missing authentication, where the endpoint read the `userId` directly from the request body. This design allowed a...

The Lab · 2026-04-19 20:22:35 · GitHub Issues

9. GitHub Security Alert: IDOR Attacks Expose Unauthorized Data Access via Direct Object Reference

A critical access control vulnerability, known as an Insecure Direct Object Reference (IDOR), is enabling attackers to directly access, modify, or delete unauthorized data by manipulating simple user inputs. This flaw bypasses standard authorization checks, exposing internal database keys and file names directly to end...

The Lab · 2026-04-19 20:22:36 · GitHub Issues

10. Security Alert: IDOR Vulnerability Exposes Unauthorized Canvas Access via URL Slug Manipulation

A critical Insecure Direct Object Reference (IDOR) vulnerability has been identified, allowing unauthorized users to potentially access or modify collaborative canvases (rooms) simply by guessing or altering the slug in the URL. This flaw bypasses intended access controls, exposing sensitive collaborative spaces to dat...

The Lab · 2026-04-22 14:27:36 · GitHub Issues

11. Critical API Authorization Flaw: Settlement Status Endpoint Exposes User Settlements to Unrestricted Modification

A critical Broken Object Level Authorization vulnerability has been identified in the settlement status update endpoint of the platform's API, potentially allowing any authenticated user to modify any other user's fiat off-ramp settlement without authorization. The flaw resides in `PATCH /api/v1/settlements/{id}/status...

The Lab · 2026-04-23 13:54:12 · GitHub Issues

12. Critical Authorization Bypass: DELETE /stream/schedules/:id Allows Any Authenticated User to Cancel Other Users' Recurring Donations

A critical broken object-level authorization (BOLA/IDOR) vulnerability has been identified in the `DELETE /stream/schedules/:id` endpoint, allowing any authenticated user with the `stream:delete` permission to cancel recurring donation schedules belonging to other users. The endpoint fails to verify that the requesting...

The Vault · 2026-04-25 16:54:07 · GitHub Issues

13. H-004: Critical Authorization Gap Exposes Core API Endpoints to Unrestricted Access

A critical vulnerability has been identified in the platform's API layer, allowing unauthenticated or unauthorized users to read and modify sensitive resources across multiple endpoint categories. The flaw, catalogued as H-004, affects at least eight separate route groups including notes, agent-groups, features, chatro...

The Lab · 2026-04-30 00:54:12 · GitHub Issues

14. Security Flaw Exposes Database Credentials Through Unprotected Chart Export API

A broken access control vulnerability in the chart export endpoint allows low-privilege users to retrieve chart configurations—including embedded database credentials—belonging to other users. The flaw affects `GET /api/v1/chart/export/`, which accepts a list of chart IDs via the `q` parameter. While the endpoint valid...

The Lab · 2026-05-02 07:54:08 · GitHub Issues

15. Critical Authentication Bypass in miconsu.app Booking API Allows Unauthorized Calendar Access

A critical security flaw has been identified in the `/api/booking/create` endpoint of miconsu.app, leaving the booking system entirely unprotected. Security researchers note the endpoint lacks any session verification, allowing anonymous users to submit booking requests without authentication. The vulnerability permits...

The Lab · 2026-05-13 15:48:38 · GitHub Issues

16. IDOR Vulnerability in PayController Allows Unauthorized Deletion of Pay Records

A critical Insecure Direct Object Reference vulnerability in the PayController's destroy action permitted any authenticated user to delete arbitrary Pay records by manipulating the id parameter, completely bypassing ownership verification. The flaw originated from the destroy method using `Pay.find_by_id(params[:id])`,...