VYPR
Medium severity6.3NVD Advisory· Published Apr 27, 2026· Updated Apr 29, 2026

CVE-2026-7142

CVE-2026-7142

Description

A vulnerability was determined in Wooey up to 0.13.2. The impacted element is the function add_or_update_script of the file wooey/api/scripts.py of the component API Endpoint. Executing a manipulation can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 0.13.3rc1 and 0.14.0 is sufficient to resolve this issue. This patch is called f7846fc0c323da8325422cab32623491757f1b88. The affected component should be upgraded.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
wooeyPyPI
< 0.13.3rc10.13.3rc1

Affected products

1

Patches

1
f7846fc0c323

fix: add is_staff authorization check to add_or_update_script API (#407)

https://github.com/wooey/Wooeyanch0rApr 10, 2026via ghsa
1 file changed · +14 0
  • wooey/api/scripts.py+14 0 modified
    @@ -184,6 +184,20 @@ def submit_script(request, slug=None):
     @require_http_methods(["POST"])
     @requires_login
     def add_or_update_script(request):
    +    if not request.user.is_staff:
    +        return JsonResponse(
    +            {
    +                "valid": False,
    +                "errors": {
    +                    "__all__": [
    +                        force_str(
    +                            _("You do not have permission to upload scripts.")
    +                        )
    +                    ]
    +                },
    +            },
    +            status=403,
    +        )
         submitted_data = request.POST.dict()
         files = request.FILES
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

9

News mentions

0

No linked articles in our index yet.