CVE-2024-7767: CWE-862 Missing Authorization in danswer-ai danswer-ai/danswer
An improper access control vulnerability exists in danswer-ai/danswer version v0.3.94. This vulnerability allows the first user created in the system to view, modify, and delete chats created by an Admin. This can lead to unauthorized access to sensitive information, loss of data integrity, and potential compliance violations.
AI Analysis
Technical Summary
CVE-2024-7767 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the danswer-ai/danswer product, specifically version v0.3.94. The vulnerability arises from improper access control mechanisms that fail to restrict the first user created in the system from accessing administrative chat data. This means that the initial user account, which may have limited privileges, can view, modify, and delete chats that were created by an Admin user, bypassing intended authorization checks. The vulnerability is network exploitable without user interaction and requires only low privileges, making it relatively easy to exploit in environments where the first user account is created and controlled by an attacker or compromised. The impact includes unauthorized access to sensitive chat data, potential data tampering, and violations of data protection regulations due to exposure of confidential information. The CVSS 3.0 base score of 6.5 reflects a medium severity rating, with high confidentiality impact but no impact on integrity or availability. No patches or known exploits have been reported yet, but the risk remains significant for organizations relying on this software for secure communications. The vulnerability highlights the importance of robust role-based access controls and secure user provisioning processes in AI-driven collaboration platforms.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive or confidential information contained within administrative chats, which may include strategic decisions, personal data, or intellectual property. This exposure risks violating the EU's GDPR and other data protection laws, potentially resulting in regulatory fines and reputational damage. The ability to modify or delete admin chats also threatens data integrity and audit trails, complicating incident response and compliance verification. Organizations using danswer-ai/danswer for internal communications or customer interactions may face operational disruptions if critical information is altered or lost. The medium severity rating indicates a moderate but tangible risk, especially in sectors with high compliance requirements such as finance, healthcare, and government. Since the vulnerability can be exploited remotely with low privileges, attackers could leverage compromised or malicious first user accounts to escalate access, increasing the threat surface.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately review and restrict the permissions assigned to the first user created in the danswer-ai/danswer system, ensuring they do not have access to administrative chat data. Implement strict role-based access controls that enforce separation of duties and least privilege principles. Where possible, disable or tightly control the creation of the first user account, using secure provisioning processes and multi-factor authentication. Monitor and audit user activities related to chat access and modifications to detect unauthorized behavior early. Apply any vendor patches or updates once available, and consider isolating the affected system within segmented network zones to limit exposure. Additionally, conduct regular security assessments and penetration tests focused on access control mechanisms within collaboration platforms. Finally, educate administrators and users about the risks of improper user role assignments and the importance of secure account management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2024-7767: CWE-862 Missing Authorization in danswer-ai danswer-ai/danswer
Description
An improper access control vulnerability exists in danswer-ai/danswer version v0.3.94. This vulnerability allows the first user created in the system to view, modify, and delete chats created by an Admin. This can lead to unauthorized access to sensitive information, loss of data integrity, and potential compliance violations.
AI-Powered Analysis
Technical Analysis
CVE-2024-7767 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the danswer-ai/danswer product, specifically version v0.3.94. The vulnerability arises from improper access control mechanisms that fail to restrict the first user created in the system from accessing administrative chat data. This means that the initial user account, which may have limited privileges, can view, modify, and delete chats that were created by an Admin user, bypassing intended authorization checks. The vulnerability is network exploitable without user interaction and requires only low privileges, making it relatively easy to exploit in environments where the first user account is created and controlled by an attacker or compromised. The impact includes unauthorized access to sensitive chat data, potential data tampering, and violations of data protection regulations due to exposure of confidential information. The CVSS 3.0 base score of 6.5 reflects a medium severity rating, with high confidentiality impact but no impact on integrity or availability. No patches or known exploits have been reported yet, but the risk remains significant for organizations relying on this software for secure communications. The vulnerability highlights the importance of robust role-based access controls and secure user provisioning processes in AI-driven collaboration platforms.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive or confidential information contained within administrative chats, which may include strategic decisions, personal data, or intellectual property. This exposure risks violating the EU's GDPR and other data protection laws, potentially resulting in regulatory fines and reputational damage. The ability to modify or delete admin chats also threatens data integrity and audit trails, complicating incident response and compliance verification. Organizations using danswer-ai/danswer for internal communications or customer interactions may face operational disruptions if critical information is altered or lost. The medium severity rating indicates a moderate but tangible risk, especially in sectors with high compliance requirements such as finance, healthcare, and government. Since the vulnerability can be exploited remotely with low privileges, attackers could leverage compromised or malicious first user accounts to escalate access, increasing the threat surface.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately review and restrict the permissions assigned to the first user created in the danswer-ai/danswer system, ensuring they do not have access to administrative chat data. Implement strict role-based access controls that enforce separation of duties and least privilege principles. Where possible, disable or tightly control the creation of the first user account, using secure provisioning processes and multi-factor authentication. Monitor and audit user activities related to chat access and modifications to detect unauthorized behavior early. Apply any vendor patches or updates once available, and consider isolating the affected system within segmented network zones to limit exposure. Additionally, conduct regular security assessments and penetration tests focused on access control mechanisms within collaboration platforms. Finally, educate administrators and users about the risks of improper user role assignments and the importance of secure account management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-08-13T18:40:30.797Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b2c178f764e1f470dd9
Added to database: 10/15/2025, 1:01:32 PM
Last enriched: 10/15/2025, 1:35:16 PM
Last updated: 10/16/2025, 1:42:08 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9804: Vulnerability in WSO2 WSO2 Identity Server as Key Manager
CriticalCVE-2025-9152: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.