CVE-2024-7767: CWE-862 Missing Authorization in danswer-ai danswer-ai/danswer
An improper access control vulnerability exists in danswer-ai/danswer version v0.3.94. This vulnerability allows the first user created in the system to view, modify, and delete chats created by an Admin. This can lead to unauthorized access to sensitive information, loss of data integrity, and potential compliance violations.
AI Analysis
Technical Summary
CVE-2024-7767 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the danswer-ai/danswer product, specifically version v0.3.94. The vulnerability arises from improper access control mechanisms that fail to restrict the first user created in the system from accessing administrative chat data. This means that the initial user account, which may have limited privileges, can view, modify, and delete chats that were created by an Admin user, bypassing intended authorization checks. The vulnerability is network exploitable without user interaction and requires only low privileges, making it relatively easy to exploit in environments where the first user account is created and controlled by an attacker or compromised. The impact includes unauthorized access to sensitive chat data, potential data tampering, and violations of data protection regulations due to exposure of confidential information. The CVSS 3.0 base score of 6.5 reflects a medium severity rating, with high confidentiality impact but no impact on integrity or availability. No patches or known exploits have been reported yet, but the risk remains significant for organizations relying on this software for secure communications. The vulnerability highlights the importance of robust role-based access controls and secure user provisioning processes in AI-driven collaboration platforms.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive or confidential information contained within administrative chats, which may include strategic decisions, personal data, or intellectual property. This exposure risks violating the EU's GDPR and other data protection laws, potentially resulting in regulatory fines and reputational damage. The ability to modify or delete admin chats also threatens data integrity and audit trails, complicating incident response and compliance verification. Organizations using danswer-ai/danswer for internal communications or customer interactions may face operational disruptions if critical information is altered or lost. The medium severity rating indicates a moderate but tangible risk, especially in sectors with high compliance requirements such as finance, healthcare, and government. Since the vulnerability can be exploited remotely with low privileges, attackers could leverage compromised or malicious first user accounts to escalate access, increasing the threat surface.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately review and restrict the permissions assigned to the first user created in the danswer-ai/danswer system, ensuring they do not have access to administrative chat data. Implement strict role-based access controls that enforce separation of duties and least privilege principles. Where possible, disable or tightly control the creation of the first user account, using secure provisioning processes and multi-factor authentication. Monitor and audit user activities related to chat access and modifications to detect unauthorized behavior early. Apply any vendor patches or updates once available, and consider isolating the affected system within segmented network zones to limit exposure. Additionally, conduct regular security assessments and penetration tests focused on access control mechanisms within collaboration platforms. Finally, educate administrators and users about the risks of improper user role assignments and the importance of secure account management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2024-7767: CWE-862 Missing Authorization in danswer-ai danswer-ai/danswer
Description
An improper access control vulnerability exists in danswer-ai/danswer version v0.3.94. This vulnerability allows the first user created in the system to view, modify, and delete chats created by an Admin. This can lead to unauthorized access to sensitive information, loss of data integrity, and potential compliance violations.
AI-Powered Analysis
Technical Analysis
CVE-2024-7767 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the danswer-ai/danswer product, specifically version v0.3.94. The vulnerability arises from improper access control mechanisms that fail to restrict the first user created in the system from accessing administrative chat data. This means that the initial user account, which may have limited privileges, can view, modify, and delete chats that were created by an Admin user, bypassing intended authorization checks. The vulnerability is network exploitable without user interaction and requires only low privileges, making it relatively easy to exploit in environments where the first user account is created and controlled by an attacker or compromised. The impact includes unauthorized access to sensitive chat data, potential data tampering, and violations of data protection regulations due to exposure of confidential information. The CVSS 3.0 base score of 6.5 reflects a medium severity rating, with high confidentiality impact but no impact on integrity or availability. No patches or known exploits have been reported yet, but the risk remains significant for organizations relying on this software for secure communications. The vulnerability highlights the importance of robust role-based access controls and secure user provisioning processes in AI-driven collaboration platforms.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive or confidential information contained within administrative chats, which may include strategic decisions, personal data, or intellectual property. This exposure risks violating the EU's GDPR and other data protection laws, potentially resulting in regulatory fines and reputational damage. The ability to modify or delete admin chats also threatens data integrity and audit trails, complicating incident response and compliance verification. Organizations using danswer-ai/danswer for internal communications or customer interactions may face operational disruptions if critical information is altered or lost. The medium severity rating indicates a moderate but tangible risk, especially in sectors with high compliance requirements such as finance, healthcare, and government. Since the vulnerability can be exploited remotely with low privileges, attackers could leverage compromised or malicious first user accounts to escalate access, increasing the threat surface.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately review and restrict the permissions assigned to the first user created in the danswer-ai/danswer system, ensuring they do not have access to administrative chat data. Implement strict role-based access controls that enforce separation of duties and least privilege principles. Where possible, disable or tightly control the creation of the first user account, using secure provisioning processes and multi-factor authentication. Monitor and audit user activities related to chat access and modifications to detect unauthorized behavior early. Apply any vendor patches or updates once available, and consider isolating the affected system within segmented network zones to limit exposure. Additionally, conduct regular security assessments and penetration tests focused on access control mechanisms within collaboration platforms. Finally, educate administrators and users about the risks of improper user role assignments and the importance of secure account management.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-08-13T18:40:30.797Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b2c178f764e1f470dd9
Added to database: 10/15/2025, 1:01:32 PM
Last enriched: 10/15/2025, 1:35:16 PM
Last updated: 1/18/2026, 9:13:52 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15536: Heap-based Buffer Overflow in BYVoid OpenCC
MediumWireshark 4.6.3 Released, (Sat, Jan 17th)
Medium"How many states are there in the United States?", (Sun, Jan 18th)
MediumTennessee Man Pleads Guilty to Repeatedly Hacking Supreme Court’s Filing System
MediumBlack Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.