{"api_version":"1","generated_at":"2026-04-23T08:14:57+00:00","cve":"CVE-2023-32310","urls":{"html":"https://cve.report/CVE-2023-32310","api":"https://cve.report/api/cve/CVE-2023-32310.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-32310","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-32310"},"summary":{"title":"CVE-2023-32310","description":"DataEase is an open source data visualization and analysis tool. The API interface for DataEase delete dashboard and delete system messages is vulnerable to insecure direct object references (IDOR). This could result in a user deleting another user's dashboard or messages or interfering with the interface for marking messages read. The vulnerability has been fixed in v1.18.7. There are no known workarounds aside from upgrading.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-06-01 16:15:00","updated_at":"2023-06-09 17:24:00"},"problem_types":["CWE-639"],"metrics":[],"references":[{"url":"https://github.com/dataease/dataease/commit/72f428e87b5395c03d2f94ef6185fc247ddbc8dc","name":"https://github.com/dataease/dataease/commit/72f428e87b5395c03d2f94ef6185fc247ddbc8dc","refsource":"MISC","tags":[],"title":"feat(仪表板): 删除分享IDOR漏洞 · dataease/dataease@72f428e · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/dataease/dataease/security/advisories/GHSA-7hv6-gv38-78wj","name":"https://github.com/dataease/dataease/security/advisories/GHSA-7hv6-gv38-78wj","refsource":"MISC","tags":[],"title":"DataEase API interfaces exist idor vulnerability · Advisory · dataease/dataease · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/dataease/dataease/pull/5342","name":"https://github.com/dataease/dataease/pull/5342","refsource":"MISC","tags":[],"title":"feat(仪表板): 删除分享IDOR漏洞 by fit2cloudrd · Pull Request #5342 · dataease/dataease · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/dataease/dataease/releases/tag/v1.18.7","name":"https://github.com/dataease/dataease/releases/tag/v1.18.7","refsource":"MISC","tags":[],"title":"Release v1.18.7 · dataease/dataease · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-32310","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32310","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"32310","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dataease","cpe5":"dataease","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-32310","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"DataEase is an open source data visualization and analysis tool. The API interface for DataEase delete dashboard and delete system messages is vulnerable to insecure direct object references (IDOR). This could result in a user deleting another user's dashboard or messages or interfering with the interface for marking messages read. The vulnerability has been fixed in v1.18.7. There are no known workarounds aside from upgrading."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-639: Authorization Bypass Through User-Controlled Key","cweId":"CWE-639"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"dataease","product":{"product_data":[{"product_name":"dataease","version":{"version_data":[{"version_affected":"=","version_value":"< 1.18.7"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/dataease/dataease/security/advisories/GHSA-7hv6-gv38-78wj","refsource":"MISC","name":"https://github.com/dataease/dataease/security/advisories/GHSA-7hv6-gv38-78wj"},{"url":"https://github.com/dataease/dataease/pull/5342","refsource":"MISC","name":"https://github.com/dataease/dataease/pull/5342"},{"url":"https://github.com/dataease/dataease/commit/72f428e87b5395c03d2f94ef6185fc247ddbc8dc","refsource":"MISC","name":"https://github.com/dataease/dataease/commit/72f428e87b5395c03d2f94ef6185fc247ddbc8dc"},{"url":"https://github.com/dataease/dataease/releases/tag/v1.18.7","refsource":"MISC","name":"https://github.com/dataease/dataease/releases/tag/v1.18.7"}]},"source":{"advisory":"GHSA-7hv6-gv38-78wj","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-06-01 16:15:00","lastModifiedDate":"2023-06-09 17:24:00","problem_types":["CWE-639"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*","versionEndExcluding":"1.18.7","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}