Improper access control vulnerability in GROWI prior to v5.1.4 (v5 series) and versions prior to v4.5.25 (v4 series) allows a remote authenticated attacker to bypass access restriction and download the markdown data from the pages set to private by the other users.
History

Wed, 07 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published: 2022-10-24T00:00:00.000Z

Updated: 2025-05-07T16:12:01.378Z

Reserved: 2022-09-30T00:00:00.000Z

Link: CVE-2022-41799

cve-icon Vulnrichment

Updated: 2024-08-03T12:56:38.188Z

cve-icon NVD

Status : Modified

Published: 2022-10-24T14:15:52.687

Modified: 2025-05-07T17:15:57.040

Link: CVE-2022-41799

cve-icon Redhat

No data.