CVE-2024-23649: CWE-285: Improper Authorization in LemmyNet lemmy
Lemmy is a link aggregator and forum for the fediverse. Starting in version 0.17.0 and prior to version 0.19.1, users can report private messages, even when they're neither sender nor recipient of the message. The API response to creating a private message report contains the private message itself, which means any user can just iterate over message ids to (loudly) obtain all private messages of an instance. A user with instance admin privileges can also abuse this if the private message is removed from the response, as they're able to see the resulting reports. Creating a private message report by POSTing to `/api/v3/private_message/report` does not validate whether the reporter is the recipient of the message. lemmy-ui does not allow the sender to report the message; the API method should likely be restricted to accessible to recipients only. The API response when creating a report contains the `private_message_report_view` with all the details of the report, including the private message that has been reported: Any authenticated user can obtain arbitrary (untargeted) private message contents. Privileges required depend on the instance configuration; when registrations are enabled without application system, the privileges required are practically none. When registration applications are required, privileges required could be considered low, but this assessment heavily varies by instance. Version 0.19.1 contains a patch for this issue. A workaround is available. If an update to a fixed Lemmy version is not immediately possible, the API route can be blocked in the reverse proxy. This will prevent anyone from reporting private messages, but it will also prevent exploitation before the update has been applied.
AI Analysis
Technical Summary
CVE-2024-23649 is a high-severity improper authorization vulnerability (CWE-285) affecting LemmyNet's lemmy software versions from 0.17.0 up to but not including 0.19.1. Lemmy is a federated link aggregator and forum platform used in the fediverse. The vulnerability arises because the API endpoint responsible for reporting private messages (/api/v3/private_message/report) does not properly validate whether the user creating the report is authorized to do so—that is, whether they are the sender or recipient of the private message. Consequently, any authenticated user can submit a report for any private message ID, even if they are unrelated to the conversation. The API response to creating such a report includes the full contents of the private message, effectively allowing unauthorized users to enumerate and access all private messages on the instance by iterating over message IDs. This leads to a significant confidentiality breach (CWE-200). The vulnerability is exacerbated by the fact that some Lemmy instances allow open registrations without application approval, meaning an attacker can easily create an account and exploit this flaw without elevated privileges. Even in instances requiring registration approval, the privilege barrier remains low. Instance administrators can also abuse the flaw to view reports and associated private messages. The vulnerability was patched in version 0.19.1. As an interim mitigation, administrators can block the vulnerable API route at the reverse proxy level, which disables private message reporting but prevents exploitation until the patch is applied. The CVSS v3.1 base score is 7.5 (high), reflecting network exploitability without authentication or user interaction, and a high impact on confidentiality with no impact on integrity or availability.
Potential Impact
For European organizations using Lemmy instances—particularly those hosting communities or federated forums—this vulnerability poses a serious risk to user privacy and data confidentiality. Private messages, which may contain sensitive personal or organizational information, can be exposed to unauthorized users, undermining trust in the platform and potentially violating data protection regulations such as the GDPR. The breach of confidentiality could lead to reputational damage, legal liabilities, and loss of user base. Since Lemmy is used in various communities including political, social, and professional groups, exposure of private communications could have broader societal impacts. The ease of exploitation without requiring elevated privileges or user interaction increases the likelihood of abuse. Organizations relying on Lemmy for internal or external communications must consider the risk of data leakage and potential compliance violations. Additionally, administrators could misuse the vulnerability to access private messages, raising insider threat concerns.
Mitigation Recommendations
The primary mitigation is to upgrade all affected Lemmy instances to version 0.19.1 or later, where the vulnerability is patched. Until an upgrade is feasible, administrators should block the /api/v3/private_message/report endpoint at the reverse proxy or firewall level to prevent exploitation. This will disable the ability to report private messages but will protect against unauthorized data disclosure. It is also recommended to audit user registrations and restrict open registrations if possible, to reduce the risk of attacker account creation. Monitoring logs for unusual activity related to private message reporting or enumeration attempts can help detect exploitation attempts. Organizations should review their instance configurations to enforce strict access controls and consider implementing additional application-layer authorization checks. Finally, informing users about the issue and encouraging cautious sharing of sensitive information until the patch is applied can reduce risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-23649: CWE-285: Improper Authorization in LemmyNet lemmy
Description
Lemmy is a link aggregator and forum for the fediverse. Starting in version 0.17.0 and prior to version 0.19.1, users can report private messages, even when they're neither sender nor recipient of the message. The API response to creating a private message report contains the private message itself, which means any user can just iterate over message ids to (loudly) obtain all private messages of an instance. A user with instance admin privileges can also abuse this if the private message is removed from the response, as they're able to see the resulting reports. Creating a private message report by POSTing to `/api/v3/private_message/report` does not validate whether the reporter is the recipient of the message. lemmy-ui does not allow the sender to report the message; the API method should likely be restricted to accessible to recipients only. The API response when creating a report contains the `private_message_report_view` with all the details of the report, including the private message that has been reported: Any authenticated user can obtain arbitrary (untargeted) private message contents. Privileges required depend on the instance configuration; when registrations are enabled without application system, the privileges required are practically none. When registration applications are required, privileges required could be considered low, but this assessment heavily varies by instance. Version 0.19.1 contains a patch for this issue. A workaround is available. If an update to a fixed Lemmy version is not immediately possible, the API route can be blocked in the reverse proxy. This will prevent anyone from reporting private messages, but it will also prevent exploitation before the update has been applied.
AI-Powered Analysis
Technical Analysis
CVE-2024-23649 is a high-severity improper authorization vulnerability (CWE-285) affecting LemmyNet's lemmy software versions from 0.17.0 up to but not including 0.19.1. Lemmy is a federated link aggregator and forum platform used in the fediverse. The vulnerability arises because the API endpoint responsible for reporting private messages (/api/v3/private_message/report) does not properly validate whether the user creating the report is authorized to do so—that is, whether they are the sender or recipient of the private message. Consequently, any authenticated user can submit a report for any private message ID, even if they are unrelated to the conversation. The API response to creating such a report includes the full contents of the private message, effectively allowing unauthorized users to enumerate and access all private messages on the instance by iterating over message IDs. This leads to a significant confidentiality breach (CWE-200). The vulnerability is exacerbated by the fact that some Lemmy instances allow open registrations without application approval, meaning an attacker can easily create an account and exploit this flaw without elevated privileges. Even in instances requiring registration approval, the privilege barrier remains low. Instance administrators can also abuse the flaw to view reports and associated private messages. The vulnerability was patched in version 0.19.1. As an interim mitigation, administrators can block the vulnerable API route at the reverse proxy level, which disables private message reporting but prevents exploitation until the patch is applied. The CVSS v3.1 base score is 7.5 (high), reflecting network exploitability without authentication or user interaction, and a high impact on confidentiality with no impact on integrity or availability.
Potential Impact
For European organizations using Lemmy instances—particularly those hosting communities or federated forums—this vulnerability poses a serious risk to user privacy and data confidentiality. Private messages, which may contain sensitive personal or organizational information, can be exposed to unauthorized users, undermining trust in the platform and potentially violating data protection regulations such as the GDPR. The breach of confidentiality could lead to reputational damage, legal liabilities, and loss of user base. Since Lemmy is used in various communities including political, social, and professional groups, exposure of private communications could have broader societal impacts. The ease of exploitation without requiring elevated privileges or user interaction increases the likelihood of abuse. Organizations relying on Lemmy for internal or external communications must consider the risk of data leakage and potential compliance violations. Additionally, administrators could misuse the vulnerability to access private messages, raising insider threat concerns.
Mitigation Recommendations
The primary mitigation is to upgrade all affected Lemmy instances to version 0.19.1 or later, where the vulnerability is patched. Until an upgrade is feasible, administrators should block the /api/v3/private_message/report endpoint at the reverse proxy or firewall level to prevent exploitation. This will disable the ability to report private messages but will protect against unauthorized data disclosure. It is also recommended to audit user registrations and restrict open registrations if possible, to reduce the risk of attacker account creation. Monitoring logs for unusual activity related to private message reporting or enumeration attempts can help detect exploitation attempts. Organizations should review their instance configurations to enforce strict access controls and consider implementing additional application-layer authorization checks. Finally, informing users about the issue and encouraging cautious sharing of sensitive information until the patch is applied can reduce risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2024-01-19T00:18:53.234Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839c098182aa0cae2b3b72e
Added to database: 5/30/2025, 2:28:40 PM
Last enriched: 7/8/2025, 7:56:18 PM
Last updated: 7/31/2025, 7:28:47 PM
Views: 16
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.