Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55075: CWE-425 Direct Request ('Forced Browsing') in Grocy project Grocy

0
Medium
VulnerabilityCVE-2024-55075cvecve-2024-55075cwe-425
Published: Mon Jan 06 2025 (01/06/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Grocy project
Product: Grocy

Description

CVE-2024-55075 is a medium severity vulnerability in Grocy up to version 4. 3. 0 that allows remote attackers with low privileges to access sensitive information by directly requesting URLs not linked in the user interface, such as calendar and recipe pages. This forced browsing vulnerability does not require user interaction and has no impact on integrity or availability but can leak confidential data. Exploitation requires network access and low-level privileges, making it moderately easy to exploit in environments where Grocy is deployed. No known exploits are currently in the wild, and no patches have been published yet. Organizations using Grocy for inventory and household management should be aware of this information disclosure risk and implement access controls or network restrictions to mitigate exposure. Countries with significant Grocy user bases or deployments in healthcare, hospitality, or supply chain sectors are at higher risk. The CVSS score of 4. 3 reflects the limited impact and moderate exploitability of this issue.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:00:48 UTC

Technical Analysis

CVE-2024-55075 is a vulnerability identified in the Grocy project, a popular open-source inventory and household management system, affecting versions up to 4.3.0. The vulnerability is classified under CWE-425, which pertains to Direct Request or Forced Browsing attacks. In this scenario, an attacker with low privileges can craft direct HTTP requests to access internal pages that are not exposed through the application's user interface, such as calendar and recipe pages. These pages may contain sensitive information that should not be accessible without proper authorization or navigation flow. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). However, it requires at least low privileges (PR:L), meaning the attacker must have some level of authenticated access, though not necessarily administrative rights. The impact is limited to confidentiality (C:L) with no effect on integrity or availability. No known exploits have been reported in the wild, and no official patches have been released at the time of this analysis. The vulnerability arises from insufficient access control checks on certain endpoints, allowing unauthorized enumeration or viewing of sensitive data by bypassing the intended UI navigation and access restrictions.

Potential Impact

The primary impact of CVE-2024-55075 is unauthorized disclosure of sensitive information stored within Grocy, such as calendar entries and recipe details. While this does not affect data integrity or system availability, the leakage of confidential information could lead to privacy violations or give attackers insights into user behavior and system usage. For organizations using Grocy in environments handling sensitive operational data—such as healthcare facilities managing medical supplies, hospitality businesses managing inventory, or supply chain operations—this information disclosure could facilitate further targeted attacks or social engineering. The requirement for low-level privileges reduces the risk somewhat but does not eliminate it, especially in environments where user accounts are shared or weakly controlled. The lack of known exploits and patches means organizations may be exposed until a fix is available, increasing the window of vulnerability.

Mitigation Recommendations

To mitigate CVE-2024-55075, organizations should implement strict access control policies to ensure that only authorized users can access sensitive endpoints, even if accessed directly via URL. This includes enforcing role-based access controls (RBAC) within Grocy and validating user permissions on the server side for all endpoints, not just those linked in the UI. Network segmentation and firewall rules can restrict access to Grocy instances to trusted internal networks or VPN users only. Monitoring and logging access to sensitive pages can help detect unauthorized attempts to exploit forced browsing. Until an official patch is released, consider disabling or restricting access to non-UI-exposed pages if feasible. Regularly update Grocy to the latest versions once patches addressing this vulnerability become available. Additionally, educate users about the risks of sharing credentials and enforce strong authentication mechanisms to reduce the likelihood of low-privilege account compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bccb7ef31ef0b55affa

Added to database: 2/25/2026, 9:38:20 PM

Last enriched: 2/26/2026, 2:00:48 AM

Last updated: 2/26/2026, 6:24:02 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats