Missing Authorization Affecting flarum/core package, versions >=1.3.0, <1.6.3


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (33rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Missing Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-FLARUMCORE-3228099
  • published11 Jan 2023
  • disclosed10 Jan 2023
  • creditclarkwinkelmann

Introduced: 10 Jan 2023

CVE-2023-22489  (opens in a new tab)
CWE-862  (opens in a new tab)

How to fix?

Upgrade flarum/core to version 1.6.3 or higher.

Overview

flarum/core is a simple discussion platform for your website.

Affected versions of this package are vulnerable to Missing Authorization when the first post of a discussion is permanently deleted, the first_post_id attribute of the discussion becomes null, which causes access control to be skipped for all new replies. Exploiting this vulnerability allows any actor who can view the discussion to create a new reply via the REST API, no matter the reply permission or lock status.

Workaround

If you don't delete the first posts you are not affected. A workaround can be to delete the discussion itself, or amend the database to manually set a first_post_id.

CVSS Scores

version 3.1