Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35723: Missing Authorization in Andrew Dashboard To-Do List

0
Unknown
VulnerabilityCVE-2024-35723cvecve-2024-35723
Published: Mon Jun 10 2024 (06/10/2024, 07:50:24 UTC)
Source: CVE Database V5
Vendor/Project: Andrew
Product: Dashboard To-Do List

Description

Missing Authorization vulnerability in Andrew Dashboard To-Do List dashboard-to-do-list.This issue affects Dashboard To-Do List: from n/a through <= 1.2.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 04:56:39 UTC

Technical Analysis

CVE-2024-35723 identifies a Missing Authorization vulnerability in the Andrew Dashboard To-Do List product, affecting versions up to and including 1.2.0. Missing Authorization means that certain functions or data within the dashboard do not enforce proper permission checks, allowing any user, including unauthenticated or unauthorized ones, to access or manipulate to-do list entries. This vulnerability stems from the absence of access control mechanisms on critical API endpoints or UI components responsible for managing to-do list data. Since the product is designed to manage task lists, unauthorized access could lead to exposure of sensitive task information or unauthorized modifications, potentially disrupting workflows or leaking confidential data. The vulnerability was reserved in May 2024 and published in June 2024, with no CVSS score assigned yet and no known active exploitation reported. The lack of a patch link indicates that a fix may still be pending or in development. The vulnerability primarily impacts confidentiality and integrity, as unauthorized users can read or alter data without restrictions. Availability impact is possible if attackers delete or corrupt to-do list data, but this is secondary. The ease of exploitation is likely high since no authentication or authorization is enforced, and user interaction is not required. The scope is limited to installations of the Andrew Dashboard To-Do List product, which may be niche or limited in deployment. Overall, this vulnerability represents a significant risk to organizations relying on this product for task management, especially if sensitive or critical information is stored within the to-do lists.

Potential Impact

The Missing Authorization vulnerability in Andrew Dashboard To-Do List can lead to unauthorized disclosure and modification of task data, compromising confidentiality and integrity. Attackers could view sensitive tasks, alter deadlines, or delete entries, disrupting organizational workflows and potentially causing operational delays or errors. In environments where to-do lists contain critical or sensitive information, this could lead to data leakage or sabotage. Although no active exploitation is reported, the ease of exploitation and lack of authorization controls make this a high-risk issue. Organizations using this product may face reputational damage, loss of trust, and operational inefficiencies if the vulnerability is exploited. The impact is more pronounced in sectors relying heavily on task management for compliance, project tracking, or sensitive operations.

Mitigation Recommendations

Organizations should immediately audit their use of Andrew Dashboard To-Do List and restrict access to trusted users only. Implement network-level access controls such as VPNs or IP whitelisting to limit exposure. Monitor logs for unusual access patterns or unauthorized modifications. If possible, disable or restrict the vulnerable to-do list functionality until a patch is available. Engage with the vendor or community to obtain or expedite a security update that enforces proper authorization checks on all relevant endpoints. Additionally, conduct a thorough review of all API endpoints and UI components to ensure authorization is enforced consistently. Employ application-layer firewalls or reverse proxies to add an additional layer of access control. Educate users about the risk and encourage reporting of suspicious activity. Finally, prepare incident response plans to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-05-17T10:09:31.574Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7448e6bfc5ba1def6923

Added to database: 4/1/2026, 7:38:48 PM

Last enriched: 4/2/2026, 4:56:39 AM

Last updated: 4/4/2026, 8:15:52 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses