CVE-2024-55075: CWE-425 Direct Request ('Forced Browsing') in Grocy project Grocy
Grocy through 4.3.0 allows remote attackers to obtain sensitive information via direct requests to pages that are not shown in the UI, such as calendar and recipes.
AI Analysis
Technical Summary
CVE-2024-55075 is a vulnerability identified in the Grocy project, a popular open-source inventory and household management system, affecting versions up to 4.3.0. The vulnerability is classified under CWE-425, which pertains to Direct Request or Forced Browsing attacks. In this scenario, an attacker with low privileges can craft direct HTTP requests to access internal pages that are not exposed through the application's user interface, such as calendar and recipe pages. These pages may contain sensitive information that should not be accessible without proper authorization or navigation flow. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). However, it requires at least low privileges (PR:L), meaning the attacker must have some level of authenticated access, though not necessarily administrative rights. The impact is limited to confidentiality (C:L) with no effect on integrity or availability. No known exploits have been reported in the wild, and no official patches have been released at the time of this analysis. The vulnerability arises from insufficient access control checks on certain endpoints, allowing unauthorized enumeration or viewing of sensitive data by bypassing the intended UI navigation and access restrictions.
Potential Impact
The primary impact of CVE-2024-55075 is unauthorized disclosure of sensitive information stored within Grocy, such as calendar entries and recipe details. While this does not affect data integrity or system availability, the leakage of confidential information could lead to privacy violations or give attackers insights into user behavior and system usage. For organizations using Grocy in environments handling sensitive operational data—such as healthcare facilities managing medical supplies, hospitality businesses managing inventory, or supply chain operations—this information disclosure could facilitate further targeted attacks or social engineering. The requirement for low-level privileges reduces the risk somewhat but does not eliminate it, especially in environments where user accounts are shared or weakly controlled. The lack of known exploits and patches means organizations may be exposed until a fix is available, increasing the window of vulnerability.
Mitigation Recommendations
To mitigate CVE-2024-55075, organizations should implement strict access control policies to ensure that only authorized users can access sensitive endpoints, even if accessed directly via URL. This includes enforcing role-based access controls (RBAC) within Grocy and validating user permissions on the server side for all endpoints, not just those linked in the UI. Network segmentation and firewall rules can restrict access to Grocy instances to trusted internal networks or VPN users only. Monitoring and logging access to sensitive pages can help detect unauthorized attempts to exploit forced browsing. Until an official patch is released, consider disabling or restricting access to non-UI-exposed pages if feasible. Regularly update Grocy to the latest versions once patches addressing this vulnerability become available. Additionally, educate users about the risks of sharing credentials and enforce strong authentication mechanisms to reduce the likelihood of low-privilege account compromise.
Affected Countries
United States, Germany, Netherlands, United Kingdom, Canada, Australia, France, Switzerland, Sweden, Belgium
CVE-2024-55075: CWE-425 Direct Request ('Forced Browsing') in Grocy project Grocy
Description
Grocy through 4.3.0 allows remote attackers to obtain sensitive information via direct requests to pages that are not shown in the UI, such as calendar and recipes.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-55075 is a vulnerability identified in the Grocy project, a popular open-source inventory and household management system, affecting versions up to 4.3.0. The vulnerability is classified under CWE-425, which pertains to Direct Request or Forced Browsing attacks. In this scenario, an attacker with low privileges can craft direct HTTP requests to access internal pages that are not exposed through the application's user interface, such as calendar and recipe pages. These pages may contain sensitive information that should not be accessible without proper authorization or navigation flow. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). However, it requires at least low privileges (PR:L), meaning the attacker must have some level of authenticated access, though not necessarily administrative rights. The impact is limited to confidentiality (C:L) with no effect on integrity or availability. No known exploits have been reported in the wild, and no official patches have been released at the time of this analysis. The vulnerability arises from insufficient access control checks on certain endpoints, allowing unauthorized enumeration or viewing of sensitive data by bypassing the intended UI navigation and access restrictions.
Potential Impact
The primary impact of CVE-2024-55075 is unauthorized disclosure of sensitive information stored within Grocy, such as calendar entries and recipe details. While this does not affect data integrity or system availability, the leakage of confidential information could lead to privacy violations or give attackers insights into user behavior and system usage. For organizations using Grocy in environments handling sensitive operational data—such as healthcare facilities managing medical supplies, hospitality businesses managing inventory, or supply chain operations—this information disclosure could facilitate further targeted attacks or social engineering. The requirement for low-level privileges reduces the risk somewhat but does not eliminate it, especially in environments where user accounts are shared or weakly controlled. The lack of known exploits and patches means organizations may be exposed until a fix is available, increasing the window of vulnerability.
Mitigation Recommendations
To mitigate CVE-2024-55075, organizations should implement strict access control policies to ensure that only authorized users can access sensitive endpoints, even if accessed directly via URL. This includes enforcing role-based access controls (RBAC) within Grocy and validating user permissions on the server side for all endpoints, not just those linked in the UI. Network segmentation and firewall rules can restrict access to Grocy instances to trusted internal networks or VPN users only. Monitoring and logging access to sensitive pages can help detect unauthorized attempts to exploit forced browsing. Until an official patch is released, consider disabling or restricting access to non-UI-exposed pages if feasible. Regularly update Grocy to the latest versions once patches addressing this vulnerability become available. Additionally, educate users about the risks of sharing credentials and enforce strong authentication mechanisms to reduce the likelihood of low-privilege account compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-12-06T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bccb7ef31ef0b55affa
Added to database: 2/25/2026, 9:38:20 PM
Last enriched: 2/26/2026, 2:00:48 AM
Last updated: 4/12/2026, 1:00:07 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.