CVE-2024-47210: n/a
Gladys Assistant before 4.45.1 allows Privilege Escalation (a user changing their own role) because req.body.role can be used in updateMySelf in server/api/controllers/user.controller.js.
AI Analysis
Technical Summary
CVE-2024-47210 is a privilege escalation vulnerability identified in Gladys Assistant, an open-source home automation platform. The issue exists in versions prior to 4.45.1 and stems from insufficient validation of the req.body.role parameter in the updateMySelf function located in server/api/controllers/user.controller.js. This function is responsible for allowing users to update their own profile information. However, due to improper access control checks, an authenticated user can manipulate the role field in the request body to assign themselves higher privileges, such as administrator roles. This vulnerability violates the principle of least privilege and can lead to unauthorized access to sensitive functions and data. The CVSS 3.1 base score of 8.8 reflects the vulnerability’s high impact on confidentiality, integrity, and availability, with an attack vector over the network, low attack complexity, and no user interaction required. Although no public exploits have been reported yet, the vulnerability’s nature makes it a significant risk for any deployment of affected Gladys Assistant versions. The CWE-400 tag appears to be a misclassification, as CWE-400 typically relates to resource exhaustion; the core issue here is improper authorization and privilege escalation.
Potential Impact
If exploited, this vulnerability allows an authenticated user to escalate their privileges arbitrarily, potentially gaining administrative control over the Gladys Assistant system. This can lead to unauthorized access to all connected smart devices, manipulation of automation rules, exposure of sensitive user data, and disruption of home automation services. The attacker could disable security features, add or remove devices, or execute commands that compromise the confidentiality, integrity, and availability of the system. For organizations or individuals relying on Gladys Assistant for critical home or office automation, this could result in significant operational disruption and privacy breaches. The ease of exploitation combined with the high impact makes this a serious threat, especially in environments where multiple users have access to the system but are expected to have limited roles.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Gladys Assistant to version 4.45.1 or later where the issue is patched. If upgrading is not immediately possible, implement strict network segmentation and access controls to restrict authenticated user access to trusted individuals only. Review and harden API endpoint permissions, ensuring that role changes cannot be performed by users on their own accounts without proper authorization checks. Employ application-layer firewalls or API gateways to monitor and block suspicious requests attempting to modify user roles. Conduct regular audits of user roles and permissions to detect unauthorized changes. Additionally, enable detailed logging and alerting on user role modifications to facilitate rapid detection and response. Educate users about the risks of privilege escalation and enforce strong authentication mechanisms to reduce the risk of compromised accounts being used to exploit this vulnerability.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Netherlands, Belgium, Australia, New Zealand
CVE-2024-47210: n/a
Description
Gladys Assistant before 4.45.1 allows Privilege Escalation (a user changing their own role) because req.body.role can be used in updateMySelf in server/api/controllers/user.controller.js.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-47210 is a privilege escalation vulnerability identified in Gladys Assistant, an open-source home automation platform. The issue exists in versions prior to 4.45.1 and stems from insufficient validation of the req.body.role parameter in the updateMySelf function located in server/api/controllers/user.controller.js. This function is responsible for allowing users to update their own profile information. However, due to improper access control checks, an authenticated user can manipulate the role field in the request body to assign themselves higher privileges, such as administrator roles. This vulnerability violates the principle of least privilege and can lead to unauthorized access to sensitive functions and data. The CVSS 3.1 base score of 8.8 reflects the vulnerability’s high impact on confidentiality, integrity, and availability, with an attack vector over the network, low attack complexity, and no user interaction required. Although no public exploits have been reported yet, the vulnerability’s nature makes it a significant risk for any deployment of affected Gladys Assistant versions. The CWE-400 tag appears to be a misclassification, as CWE-400 typically relates to resource exhaustion; the core issue here is improper authorization and privilege escalation.
Potential Impact
If exploited, this vulnerability allows an authenticated user to escalate their privileges arbitrarily, potentially gaining administrative control over the Gladys Assistant system. This can lead to unauthorized access to all connected smart devices, manipulation of automation rules, exposure of sensitive user data, and disruption of home automation services. The attacker could disable security features, add or remove devices, or execute commands that compromise the confidentiality, integrity, and availability of the system. For organizations or individuals relying on Gladys Assistant for critical home or office automation, this could result in significant operational disruption and privacy breaches. The ease of exploitation combined with the high impact makes this a serious threat, especially in environments where multiple users have access to the system but are expected to have limited roles.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Gladys Assistant to version 4.45.1 or later where the issue is patched. If upgrading is not immediately possible, implement strict network segmentation and access controls to restrict authenticated user access to trusted individuals only. Review and harden API endpoint permissions, ensuring that role changes cannot be performed by users on their own accounts without proper authorization checks. Employ application-layer firewalls or API gateways to monitor and block suspicious requests attempting to modify user roles. Conduct regular audits of user roles and permissions to detect unauthorized changes. Additionally, enable detailed logging and alerting on user role modifications to facilitate rapid detection and response. Educate users about the risks of privilege escalation and enforce strong authentication mechanisms to reduce the risk of compromised accounts being used to exploit this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-09-21T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d08b7ef31ef0b56d591
Added to database: 2/25/2026, 9:43:36 PM
Last enriched: 2/26/2026, 8:48:01 AM
Last updated: 4/12/2026, 3:35:15 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.