CVE-2024-55075: CWE-425 Direct Request ('Forced Browsing') in Grocy project Grocy
CVE-2024-55075 is a medium severity vulnerability in Grocy up to version 4. 3. 0 that allows remote attackers with low privileges to access sensitive information by directly requesting URLs not linked in the user interface, such as calendar and recipe pages. This forced browsing vulnerability does not require user interaction and has no impact on integrity or availability but can leak confidential data. Exploitation requires network access and low-level privileges, making it moderately easy to exploit in environments where Grocy is deployed. No known exploits are currently in the wild, and no patches have been published yet. Organizations using Grocy for inventory and household management should be aware of this information disclosure risk and implement access controls or network restrictions to mitigate exposure. Countries with significant Grocy user bases or deployments in healthcare, hospitality, or supply chain sectors are at higher risk. The CVSS score of 4. 3 reflects the limited impact and moderate exploitability of this issue.
AI Analysis
Technical Summary
CVE-2024-55075 is a vulnerability identified in the Grocy project, a popular open-source inventory and household management system, affecting versions up to 4.3.0. The vulnerability is classified under CWE-425, which pertains to Direct Request or Forced Browsing attacks. In this scenario, an attacker with low privileges can craft direct HTTP requests to access internal pages that are not exposed through the application's user interface, such as calendar and recipe pages. These pages may contain sensitive information that should not be accessible without proper authorization or navigation flow. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). However, it requires at least low privileges (PR:L), meaning the attacker must have some level of authenticated access, though not necessarily administrative rights. The impact is limited to confidentiality (C:L) with no effect on integrity or availability. No known exploits have been reported in the wild, and no official patches have been released at the time of this analysis. The vulnerability arises from insufficient access control checks on certain endpoints, allowing unauthorized enumeration or viewing of sensitive data by bypassing the intended UI navigation and access restrictions.
Potential Impact
The primary impact of CVE-2024-55075 is unauthorized disclosure of sensitive information stored within Grocy, such as calendar entries and recipe details. While this does not affect data integrity or system availability, the leakage of confidential information could lead to privacy violations or give attackers insights into user behavior and system usage. For organizations using Grocy in environments handling sensitive operational data—such as healthcare facilities managing medical supplies, hospitality businesses managing inventory, or supply chain operations—this information disclosure could facilitate further targeted attacks or social engineering. The requirement for low-level privileges reduces the risk somewhat but does not eliminate it, especially in environments where user accounts are shared or weakly controlled. The lack of known exploits and patches means organizations may be exposed until a fix is available, increasing the window of vulnerability.
Mitigation Recommendations
To mitigate CVE-2024-55075, organizations should implement strict access control policies to ensure that only authorized users can access sensitive endpoints, even if accessed directly via URL. This includes enforcing role-based access controls (RBAC) within Grocy and validating user permissions on the server side for all endpoints, not just those linked in the UI. Network segmentation and firewall rules can restrict access to Grocy instances to trusted internal networks or VPN users only. Monitoring and logging access to sensitive pages can help detect unauthorized attempts to exploit forced browsing. Until an official patch is released, consider disabling or restricting access to non-UI-exposed pages if feasible. Regularly update Grocy to the latest versions once patches addressing this vulnerability become available. Additionally, educate users about the risks of sharing credentials and enforce strong authentication mechanisms to reduce the likelihood of low-privilege account compromise.
Affected Countries
United States, Germany, Netherlands, United Kingdom, Canada, Australia, France, Switzerland, Sweden, Belgium
CVE-2024-55075: CWE-425 Direct Request ('Forced Browsing') in Grocy project Grocy
Description
CVE-2024-55075 is a medium severity vulnerability in Grocy up to version 4. 3. 0 that allows remote attackers with low privileges to access sensitive information by directly requesting URLs not linked in the user interface, such as calendar and recipe pages. This forced browsing vulnerability does not require user interaction and has no impact on integrity or availability but can leak confidential data. Exploitation requires network access and low-level privileges, making it moderately easy to exploit in environments where Grocy is deployed. No known exploits are currently in the wild, and no patches have been published yet. Organizations using Grocy for inventory and household management should be aware of this information disclosure risk and implement access controls or network restrictions to mitigate exposure. Countries with significant Grocy user bases or deployments in healthcare, hospitality, or supply chain sectors are at higher risk. The CVSS score of 4. 3 reflects the limited impact and moderate exploitability of this issue.
AI-Powered Analysis
Technical Analysis
CVE-2024-55075 is a vulnerability identified in the Grocy project, a popular open-source inventory and household management system, affecting versions up to 4.3.0. The vulnerability is classified under CWE-425, which pertains to Direct Request or Forced Browsing attacks. In this scenario, an attacker with low privileges can craft direct HTTP requests to access internal pages that are not exposed through the application's user interface, such as calendar and recipe pages. These pages may contain sensitive information that should not be accessible without proper authorization or navigation flow. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). However, it requires at least low privileges (PR:L), meaning the attacker must have some level of authenticated access, though not necessarily administrative rights. The impact is limited to confidentiality (C:L) with no effect on integrity or availability. No known exploits have been reported in the wild, and no official patches have been released at the time of this analysis. The vulnerability arises from insufficient access control checks on certain endpoints, allowing unauthorized enumeration or viewing of sensitive data by bypassing the intended UI navigation and access restrictions.
Potential Impact
The primary impact of CVE-2024-55075 is unauthorized disclosure of sensitive information stored within Grocy, such as calendar entries and recipe details. While this does not affect data integrity or system availability, the leakage of confidential information could lead to privacy violations or give attackers insights into user behavior and system usage. For organizations using Grocy in environments handling sensitive operational data—such as healthcare facilities managing medical supplies, hospitality businesses managing inventory, or supply chain operations—this information disclosure could facilitate further targeted attacks or social engineering. The requirement for low-level privileges reduces the risk somewhat but does not eliminate it, especially in environments where user accounts are shared or weakly controlled. The lack of known exploits and patches means organizations may be exposed until a fix is available, increasing the window of vulnerability.
Mitigation Recommendations
To mitigate CVE-2024-55075, organizations should implement strict access control policies to ensure that only authorized users can access sensitive endpoints, even if accessed directly via URL. This includes enforcing role-based access controls (RBAC) within Grocy and validating user permissions on the server side for all endpoints, not just those linked in the UI. Network segmentation and firewall rules can restrict access to Grocy instances to trusted internal networks or VPN users only. Monitoring and logging access to sensitive pages can help detect unauthorized attempts to exploit forced browsing. Until an official patch is released, consider disabling or restricting access to non-UI-exposed pages if feasible. Regularly update Grocy to the latest versions once patches addressing this vulnerability become available. Additionally, educate users about the risks of sharing credentials and enforce strong authentication mechanisms to reduce the likelihood of low-privilege account compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-12-06T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bccb7ef31ef0b55affa
Added to database: 2/25/2026, 9:38:20 PM
Last enriched: 2/26/2026, 2:00:48 AM
Last updated: 2/26/2026, 6:24:02 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.