GHSA-5Q8V-J673-M5V4: Insecure Direct Object Reference and Authorization Bypass in Firefly III API
Vulnerability ID: GHSA-5Q8V-J673-M5V4
CVSS Score: 5.7
Published: 2026-03-07
Firefly III versions 6.4.23 through 6.5.0 contain an Insecure Direct Object Reference (IDOR) vulnerability within the user management API endpoints. The application fails to validate role-based access controls on specific API routes, allowing any authenticated user to enumerate and read the sensitive details of all registered accounts on the system.
TL;DR
Missing authorization checks in the Firefly III UserController allow low-privileged authenticated users to access sensitive data (emails, roles, account status) of all other users via the API.
⚠️ Exploit Status: POC
Technical Details
- Vulnerability ID: GHSA-5Q8V-J673-M5V4
- CWE ID: CWE-863 (Incorrect Authorization)
- CVSS v4.0 Score: 5.7 (Medium)
- Attack Vector: Network (Authenticated API Request)
- Exploit Status: Proof of Concept Available
- Impact: High Data Confidentiality (Information Disclosure)
Affected Systems
- Firefly III API
- grumpydictator/firefly-iii (Packagist ecosystem)
-
Firefly III: >= 6.4.23, <= 6.5.0 (Fixed in:
6.5.1)
Code Analysis
Commit: 26c6985
Implemented owner role checks in UserController index and show methods to resolve API IDOR.
Exploit Details
- General Advisory: Advisory details cURL payload used to enumerate the user list via API.
Mitigation Strategies
- Upgrade Firefly III to version 6.5.1
- Implement WAF rules to restrict access to
/api/v1/usersbased on IP allowlisting - Apply intermediate
ownermiddleware to the user management API route group
Remediation Steps:
- Verify the current version of Firefly III deployed in the environment.
- Execute the standard upgrade procedure utilizing Composer:
composer update grumpydictator/firefly-iii. - Validate the update by attempting to access
/api/v1/userswith a standard, non-owner user token. - Audit application access logs for indicators of prior enumeration.
References
- GHSA-5Q8V-J673-M5V4 Official GitHub Security Advisory
- OSV Entry for GHSA-5q8v-j673-m5v4
- Firefly III GitHub Repository
Read the full report for GHSA-5Q8V-J673-M5V4 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)