All objects for which an object-management configuration exists can be listed, viewed, edited, created or deleted by unauthorised users.
If object-urls are exposed via other channels, the contents of these objects can be viewed independent of object-management configurations.
The following conditions have to be met in order to perform this attack:
- A user must be logged in
- No relevant application roles are required
- At least one object-type must be configured via object-management
- The scope of the attack is limited to objects that are configured via object-management.
- The value of showInDataMenu
is irrelevant for this attack
No patch is available yet
It is possible to override the endpoint security as defined in ObjectenApiHttpSecurityConfigurer
and ObjectManagementHttpSecurityConfigurer
. Depending on the implementation, this could result in loss of functionality.
{ "nvd_published_at": "2025-05-30T06:15:28Z", "cwe_ids": [ "CWE-863" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-05-28T14:38:54Z" }