Valtimo backend libraries allows objects in the object-api to be accessed and modified by unauthorized users
High severity
GitHub Reviewed
Published
May 27, 2025
in
valtimo-platform/valtimo-backend-libraries
•
Updated Jun 4, 2025
Package
Affected versions
>= 11.0.0.RELEASE, <= 11.3.3.RELEASE
>= 12.0.0.RELEASE, < 12.13.0.RELEASE
Patched versions
12.13.0.RELEASE
>= 11.0.0.RELEASE, <= 11.3.3.RELEASE
>= 12.0.0.RELEASE, < 12.13.0.RELEASE
12.13.0.RELEASE
Description
Published to the GitHub Advisory Database
May 28, 2025
Reviewed
May 28, 2025
Published by the National Vulnerability Database
May 30, 2025
Last updated
Jun 4, 2025
Impact
All objects for which an object-management configuration exists can be listed, viewed, edited, created or deleted by unauthorised users.
If object-urls are exposed via other channels, the contents of these objects can be viewed independent of object-management configurations.
Attack requirements
The following conditions have to be met in order to perform this attack:
showInDataMenu
is irrelevant for this attackPatches
This issue was patched in version 12.13.0.RELEASE.
Workarounds
It is possible to override the endpoint security as defined in
ObjectenApiHttpSecurityConfigurer
andObjectManagementHttpSecurityConfigurer
. Depending on the implementation, this could result in loss of functionality.References