VYPR
High severity8.3NVD Advisory· Published Mar 16, 2026· Updated May 19, 2026

CVE-2026-25083

CVE-2026-25083

Description

GROWI OpenAI thread/message API endpoints do not perform authorization. Affected are v7.4.5 and earlier versions. A logged-in user who knows a shared AI assistant's identifier may view and/or tamper the other user's threads/messages.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

GROWI v7.4.5 and earlier lack authorization checks in OpenAI thread/message API endpoints, allowing authenticated users to access or modify other users' AI assistant threads if they know the assistant identifier.

Root

Cause

GROWI versions up to v7.4.5 contain a missing authorization vulnerability (CWE-862) in the OpenAI thread and message API endpoints [1]. This means the application fails to verify that the user making a request to these endpoints is permitted to access the targeted thread or message. The vulnerability is classified as an Insecure Direct Object Reference (IDOR), as referenced in the vendor advisory [2].

Exploitation

An attacker must be a logged-in user and know the identifier of a shared AI assistant [1]. With that knowledge, they can send crafted API requests to view or modify threads and messages belonging to other users who also use the same shared AI assistant. No other authentication bypass is required because the endpoint itself lacks authorization checks [2].

Impact

A successful exploit allows an authenticated attacker to read the contents of another user's AI assistant threads (violating confidentiality) and also to tamper with or delete those threads/messages (violating integrity). Availability is partially affected as well, reflected in the CVSS v3.1 score of 8.3 (High) [1].

Mitigation

The vulnerability is fixed in GROWI v7.4.6 [1][2]. Users should update to this version immediately. The vendor has released the update via GitHub and Docker Hub [2]. There are no known workarounds documented, so upgrading is the recommended course of action.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Weseek/Growillm-fuzzy
    Range: <=7.4.5
  • GROWI, Inc./GROWIv5
    Range: v7.4.5 and earlier

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.