Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8057: CWE-306 Missing Authentication for Critical Function in danswer-ai danswer-ai/danswer

0
Medium
VulnerabilityCVE-2024-8057cvecve-2024-8057cwe-306
Published: Thu Mar 20 2025 (03/20/2025, 10:10:47 UTC)
Source: CVE Database V5
Vendor/Project: danswer-ai
Product: danswer-ai/danswer

Description

In version 0.4.1 of danswer-ai/danswer, a vulnerability exists where a basic user can create credentials and link them to an existing connector. This issue arises because the system allows an unauthenticated attacker to sign up with a basic account and perform actions that should be restricted to admin users. This can lead to excessive resource consumption, potentially resulting in a Denial of Service (DoS) and other significant issues, impacting the system's stability and security.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:21:37 UTC

Technical Analysis

CVE-2024-8057 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting danswer-ai/danswer version 0.4.1. The core issue is that the system permits unauthenticated attackers to register as basic users and subsequently create credentials linked to existing connectors, which should be an admin-only operation. This lack of proper authentication and authorization controls allows attackers to misuse system functions, potentially leading to excessive resource consumption. Such misuse can degrade system performance or cause Denial of Service (DoS), impacting availability and system stability. The vulnerability does not expose confidential data or allow data modification but compromises service reliability. The CVSS 3.0 score is 4.3 (medium), reflecting network attack vector, low complexity, requiring privileges (basic user), no user interaction, and impact limited to availability. No known exploits are reported in the wild yet. The vulnerability highlights insufficient access control mechanisms in the user management and connector linking processes within danswer-ai/danswer. Since the affected versions are unspecified beyond 0.4.1, users should assume all versions up to and including 0.4.1 are vulnerable until patched. The vulnerability is particularly relevant for organizations deploying danswer-ai/danswer in multi-user environments where user registration is enabled without strict validation.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability and stability of systems running danswer-ai/danswer, especially in environments where the software is used for knowledge management or AI-driven data connectors. An attacker exploiting this flaw could create numerous unauthorized credentials linked to connectors, causing resource exhaustion and potential service outages. This could disrupt business operations, delay decision-making processes, and reduce trust in AI-based tools. Organizations in sectors such as finance, healthcare, research, and critical infrastructure that rely on AI knowledge platforms may face operational risks. While confidentiality and data integrity are not directly impacted, the denial of service could indirectly affect compliance with service availability requirements under regulations like GDPR and NIS Directive. The medium severity suggests the threat is significant but not critical, allowing time for mitigation but requiring prompt attention to avoid escalation or exploitation in combination with other vulnerabilities.

Mitigation Recommendations

1. Immediately restrict or disable public user sign-up functionality until a secure authentication mechanism is implemented. 2. Implement strict role-based access control (RBAC) to ensure that only authorized admin users can create or link credentials to connectors. 3. Monitor and limit resource usage associated with user account creation and connector linking to detect and prevent abuse or resource exhaustion. 4. Apply input validation and enforce authentication checks on all critical functions, especially those related to credential management. 5. Deploy network-level protections such as rate limiting and IP blacklisting to reduce the risk of automated exploitation attempts. 6. Stay updated with vendor advisories and apply patches or updates as soon as they become available. 7. Conduct regular security audits and penetration testing focusing on authentication and authorization mechanisms within the application. 8. Educate administrators and users about the risks of unauthorized account creation and encourage reporting of suspicious activities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-08-21T18:12:10.480Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b2c178f764e1f470df1

Added to database: 10/15/2025, 1:01:32 PM

Last enriched: 10/15/2025, 1:21:37 PM

Last updated: 10/16/2025, 8:44:37 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats