The Network · 2026-03-05 10:43:41 · ai
A critical security vulnerability has been publicly disclosed via a GitHub issue, posing a significant privilege escalation risk. The issue, classified with a CVSS score of 8.0 (CRITICAL), is categorized under CWE-269 (Improper Privilege Management) and OWASP A01:2021 (Broken Access Control). The flaw resides within an...
The Lab · 2026-03-27 07:26:54 · GitHub Issues
A critical security flaw in a library management system's API allows any attacker to bypass access controls and retrieve the entire dataset of borrow records simply by sending an invalid query parameter. The vulnerability, classified as HIGH severity, resides in the `BorrowController.java` file where a silent exception...
The Lab · 2026-04-02 18:27:22 · GitHub Issues
A critical security vulnerability allows users with disabled or banned LDAP accounts to retain full SSH access to artifact repositories indefinitely. The flaw exists because SSH authentication paths fail to check user account status, creating a dangerous bypass of standard access controls. While web and JWT authenticat...
The Lab · 2026-04-03 15:27:02 · GitHub Issues
A critical access control vulnerability has been identified in the Athena platform's machine-to-machine (M2M) client registration system. The flaw allows any authenticated administrator to bypass the intended security controls and assign arbitrary, potentially dangerous OAuth2 scopes to new M2M clients. This server-sid...
The Lab · 2026-04-03 21:57:11 · Ars Technica
The viral AI tool OpenClaw has patched three high-severity vulnerabilities, providing a stark object lesson in the inherent risks of granting an autonomous agent sweeping control over a user's digital life. For over a month, security practitioners have warned of the tool's perilous design, which requires extensive acce...
The Lab · 2026-04-04 06:26:52 · GitHub Issues
A critical security vulnerability, known as a 'sensitivity mixing' attack, threatens AI agents built on the CrewAI framework. This flaw allows an agent with broad tool access to read confidential data and then exfiltrate it by writing to a lower-sensitivity channel, creating a direct path for data leaks. The attack pat...
The Lab · 2026-04-05 22:26:50 · GitHub Issues
A critical privilege escalation vulnerability has been identified within GitHub's administrative infrastructure. The platform's feature flag management endpoints, which control system-wide functionality, are missing the mandatory admin role checks required to restrict access. This oversight means any authenticated user...
The Lab · 2026-04-09 20:57:08 · Decrypt
OpenAI and Anthropic are placing their most powerful AI cybersecurity capabilities behind a high wall, restricting access exclusively to a select group of vetted organizations. This move signals a strategic shift from broad availability to controlled, 'trusted access' models for frontier AI tools deemed critical for se...
The Lab · 2026-04-11 10:22:34 · GitHub Issues
A critical access control flaw in the Lychee photo management software allowed authenticated users to view the private sharing permissions of every album on an instance. The vulnerability, tracked as CVE-2026-39957, stemmed from a SQL operator-precedence bug in the `SharingController::listAll()` function. This bug caus...
The Lab · 2026-04-11 22:22:24 · GitHub Issues
A critical security flaw has been exposed in a user management system's `EditSelf` permission, allowing any authenticated user to potentially read any person's record via an API endpoint. The vulnerability, tracked as GHSA-5w59-32c8-933v, stems from the API's failure to enforce proper scoping for the permission, which ...
The Lab · 2026-04-13 17:22:55 · GitHub Issues
A critical broken access control vulnerability has been patched in a software project, following a formal report from the security platform Patchstack. The fix, documented in a GitHub issue, addresses a security flaw that could have allowed unauthorized access or privilege escalation. The presence of a CVE identifier u...
The Lab · 2026-04-14 21:22:54 · GitHub Issues
A critical architectural flaw in multi-tenant agentic platforms allows a single compromise to cascade across customer environments. The vulnerability, termed Cross-Tenant Propagation via Shared Agent Identities, occurs when platforms reuse identities, base models, or credential pools across different tenants. An attack...
The Lab · 2026-04-19 20:22:35 · GitHub Issues
A critical access control vulnerability, known as an Insecure Direct Object Reference (IDOR), is enabling attackers to directly access, modify, or delete unauthorized data by manipulating simple user inputs. This flaw bypasses standard authorization checks, exposing internal database keys and file names directly to end...
The Lab · 2026-04-19 20:22:36 · GitHub Issues
A critical Insecure Direct Object Reference (IDOR) vulnerability has been identified, allowing unauthorized users to potentially access or modify collaborative canvases (rooms) simply by guessing or altering the slug in the URL. This flaw bypasses intended access controls, exposing sensitive collaborative spaces to dat...
The Lab · 2026-04-21 11:22:48 · GitHub Issues
A critical access control anomaly has been identified in Stripe's sandbox environment, where authenticated users are being blocked from retrieving their own customer data. During a penetration test, a call to the `GET /v1/customers/{id}` endpoint with a valid customer ID belonging to the authenticated account returned ...
The Lab · 2026-04-23 09:54:13 · GitHub Issues
A security disclosure filed on GitHub reveals that the Generations service API improperly exposes personally identifiable information through two endpoints: GET /v1/generations and GET /v1/generations/{id}. The affected responses include `user_id` (the UUID of the requesting user) and `ip_address` (the originating IP a...
The Lab · 2026-04-23 09:54:14 · GitHub Issues
A security vulnerability in the usage reporting API allows any authenticated organization member—including those with minimal viewer permissions—to access detailed per-user spending data and identity information. The affected endpoint, GET /v1/usage, returns a `top_users` array containing each user's UUID, request coun...
The Lab · 2026-04-24 15:54:13 · GitHub Issues
A security audit of the DenchClaw project has uncovered that it relies on a vulnerable version of the openclaw dependency, placing the entire project under potential exposure to a critical path restriction bypass in its QMD backend. The flaw specifically affects the memory_get function, which normally should restrict f...
The Lab · 2026-04-30 00:54:12 · GitHub Issues
A broken access control vulnerability in the chart export endpoint allows low-privilege users to retrieve chart configurations—including embedded database credentials—belonging to other users. The flaw affects `GET /api/v1/chart/export/`, which accepts a list of chart IDs via the `q` parameter. While the endpoint valid...
The Lab · 2026-05-11 17:38:25 · Mastodon:mastodon.social:#infosec
A critical authorization vulnerability, tracked as CVE-2026-7813, has been identified in pgAdmin 4 server mode with a CVSS score of 9.9. The flaw allows unauthorized access to user-owned objects across multiple modules, including Server Groups, Servers, Shared Servers, Background Processes, and the Debugger. Security r...