Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7767: CWE-862 Missing Authorization in danswer-ai danswer-ai/danswer

0
Medium
VulnerabilityCVE-2024-7767cvecve-2024-7767cwe-862
Published: Thu Mar 20 2025 (03/20/2025, 10:11:20 UTC)
Source: CVE Database V5
Vendor/Project: danswer-ai
Product: danswer-ai/danswer

Description

An improper access control vulnerability exists in danswer-ai/danswer version v0.3.94. This vulnerability allows the first user created in the system to view, modify, and delete chats created by an Admin. This can lead to unauthorized access to sensitive information, loss of data integrity, and potential compliance violations.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:35:16 UTC

Technical Analysis

CVE-2024-7767 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the danswer-ai/danswer product, specifically version v0.3.94. The vulnerability arises from improper access control mechanisms that fail to restrict the first user created in the system from accessing administrative chat data. This means that the initial user account, which may have limited privileges, can view, modify, and delete chats that were created by an Admin user, bypassing intended authorization checks. The vulnerability is network exploitable without user interaction and requires only low privileges, making it relatively easy to exploit in environments where the first user account is created and controlled by an attacker or compromised. The impact includes unauthorized access to sensitive chat data, potential data tampering, and violations of data protection regulations due to exposure of confidential information. The CVSS 3.0 base score of 6.5 reflects a medium severity rating, with high confidentiality impact but no impact on integrity or availability. No patches or known exploits have been reported yet, but the risk remains significant for organizations relying on this software for secure communications. The vulnerability highlights the importance of robust role-based access controls and secure user provisioning processes in AI-driven collaboration platforms.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive or confidential information contained within administrative chats, which may include strategic decisions, personal data, or intellectual property. This exposure risks violating the EU's GDPR and other data protection laws, potentially resulting in regulatory fines and reputational damage. The ability to modify or delete admin chats also threatens data integrity and audit trails, complicating incident response and compliance verification. Organizations using danswer-ai/danswer for internal communications or customer interactions may face operational disruptions if critical information is altered or lost. The medium severity rating indicates a moderate but tangible risk, especially in sectors with high compliance requirements such as finance, healthcare, and government. Since the vulnerability can be exploited remotely with low privileges, attackers could leverage compromised or malicious first user accounts to escalate access, increasing the threat surface.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review and restrict the permissions assigned to the first user created in the danswer-ai/danswer system, ensuring they do not have access to administrative chat data. Implement strict role-based access controls that enforce separation of duties and least privilege principles. Where possible, disable or tightly control the creation of the first user account, using secure provisioning processes and multi-factor authentication. Monitor and audit user activities related to chat access and modifications to detect unauthorized behavior early. Apply any vendor patches or updates once available, and consider isolating the affected system within segmented network zones to limit exposure. Additionally, conduct regular security assessments and penetration tests focused on access control mechanisms within collaboration platforms. Finally, educate administrators and users about the risks of improper user role assignments and the importance of secure account management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-08-13T18:40:30.797Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b2c178f764e1f470dd9

Added to database: 10/15/2025, 1:01:32 PM

Last enriched: 10/15/2025, 1:35:16 PM

Last updated: 10/16/2025, 1:42:08 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats