CVE-2024-50671: n/a
Incorrect access control in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows attackers with Authenticated User roles to obtain email addresses via the "Get users" feature. The vulnerability occurs due to a flaw in permission verification logic, where the wildcard character in permitted URLs grants unintended access to endpoints restricted to users with Super Admin roles. This makes it possible for attackers to disclose the email addresses of all users.
AI Analysis
Technical Summary
CVE-2024-50671 is a medium-severity vulnerability affecting Adapt Learning's Adapt Authoring Tool versions up to 0.11.3. The root cause is an incorrect access control mechanism tied to the permission verification logic, specifically involving the use of a wildcard character in permitted URLs. This wildcard inadvertently grants authenticated users with standard roles access to API endpoints intended only for Super Admin users. Exploiting this flaw, an attacker can leverage the 'Get users' feature to retrieve email addresses of all users registered in the system. The vulnerability does not require user interaction and can be exploited remotely over the network by any authenticated user, making it a privilege escalation of sorts within the application. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and limited confidentiality impact. No integrity or availability impacts are reported. The flaw is categorized under CWE-863 (Incorrect Authorization). There are no known public exploits or patches currently available, so mitigation relies on configuration and monitoring until a fix is released.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of user email addresses, which compromises user privacy and confidentiality. While it does not directly affect data integrity or system availability, the exposure of email addresses can facilitate targeted phishing, social engineering attacks, or further reconnaissance by adversaries. Organizations using the Adapt Authoring Tool may face reputational damage and potential regulatory compliance issues related to data privacy laws such as GDPR or CCPA. Since exploitation requires authenticated access, the threat is limited to insiders or attackers who have obtained user credentials. However, given that email addresses are often used as identifiers and communication channels, their exposure can be leveraged in multi-stage attacks. The lack of known exploits in the wild reduces immediate risk, but the vulnerability remains a concern until remediated.
Mitigation Recommendations
1. Immediately audit and restrict user permissions in the Adapt Authoring Tool to the minimum necessary, especially limiting access to the 'Get users' feature to trusted roles only. 2. Implement strict role-based access control (RBAC) policies and review the use of wildcard characters in URL permission configurations to prevent unintended access. 3. Monitor application logs for unusual access patterns to user data endpoints, particularly requests to 'Get users' from non-privileged accounts. 4. Educate users about credential security to reduce the risk of unauthorized authenticated access. 5. If possible, isolate the Adapt Authoring Tool behind additional access controls such as VPNs or IP whitelisting to reduce exposure. 6. Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 7. Consider implementing additional application-layer protections such as Web Application Firewalls (WAFs) to detect and block suspicious API calls related to user enumeration.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, Netherlands, India, Japan, South Korea
CVE-2024-50671: n/a
Description
Incorrect access control in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows attackers with Authenticated User roles to obtain email addresses via the "Get users" feature. The vulnerability occurs due to a flaw in permission verification logic, where the wildcard character in permitted URLs grants unintended access to endpoints restricted to users with Super Admin roles. This makes it possible for attackers to disclose the email addresses of all users.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-50671 is a medium-severity vulnerability affecting Adapt Learning's Adapt Authoring Tool versions up to 0.11.3. The root cause is an incorrect access control mechanism tied to the permission verification logic, specifically involving the use of a wildcard character in permitted URLs. This wildcard inadvertently grants authenticated users with standard roles access to API endpoints intended only for Super Admin users. Exploiting this flaw, an attacker can leverage the 'Get users' feature to retrieve email addresses of all users registered in the system. The vulnerability does not require user interaction and can be exploited remotely over the network by any authenticated user, making it a privilege escalation of sorts within the application. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and limited confidentiality impact. No integrity or availability impacts are reported. The flaw is categorized under CWE-863 (Incorrect Authorization). There are no known public exploits or patches currently available, so mitigation relies on configuration and monitoring until a fix is released.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of user email addresses, which compromises user privacy and confidentiality. While it does not directly affect data integrity or system availability, the exposure of email addresses can facilitate targeted phishing, social engineering attacks, or further reconnaissance by adversaries. Organizations using the Adapt Authoring Tool may face reputational damage and potential regulatory compliance issues related to data privacy laws such as GDPR or CCPA. Since exploitation requires authenticated access, the threat is limited to insiders or attackers who have obtained user credentials. However, given that email addresses are often used as identifiers and communication channels, their exposure can be leveraged in multi-stage attacks. The lack of known exploits in the wild reduces immediate risk, but the vulnerability remains a concern until remediated.
Mitigation Recommendations
1. Immediately audit and restrict user permissions in the Adapt Authoring Tool to the minimum necessary, especially limiting access to the 'Get users' feature to trusted roles only. 2. Implement strict role-based access control (RBAC) policies and review the use of wildcard characters in URL permission configurations to prevent unintended access. 3. Monitor application logs for unusual access patterns to user data endpoints, particularly requests to 'Get users' from non-privileged accounts. 4. Educate users about credential security to reduce the risk of unauthorized authenticated access. 5. If possible, isolate the Adapt Authoring Tool behind additional access controls such as VPNs or IP whitelisting to reduce exposure. 6. Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 7. Consider implementing additional application-layer protections such as Web Application Firewalls (WAFs) to detect and block suspicious API calls related to user enumeration.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b9eb7ef31ef0b5573fa
Added to database: 2/25/2026, 9:37:34 PM
Last enriched: 2/27/2026, 10:41:24 PM
Last updated: 4/12/2026, 3:45:17 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.