CVE-2025-63783

7.6 HIGH

📋 TL;DR

This Broken Object Level Authorization vulnerability in Onlook web application allows authenticated attackers to modify, delete, or manipulate tags on other users' projects by sending requests with unauthorized project IDs. The vulnerability affects all users of Onlook 0.2.32 who have project data in the system. Attackers can compromise data integrity and availability through unauthorized project manipulation.

💻 Affected Systems

Products:
  • Onlook web application
Versions: 0.2.32
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in tRPC mutation APIs (update, delete, add/remove tag) for projects. Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete loss of project data integrity through mass deletion/modification of all user projects, leading to data corruption, service disruption, and potential business impact.

🟠

Likely Case

Targeted attacks against specific users' projects resulting in unauthorized modifications, data loss, or tag manipulation that could affect project organization and functionality.

🟢

If Mitigated

Limited to authenticated users only, with proper logging allowing detection and investigation of unauthorized access attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid authentication credentials but minimal technical skill. Public blog posts demonstrate the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Implement authorization checks in tRPC mutation APIs to verify user ownership/membership for requested project IDs.

🔧 Temporary Workarounds

Implement API-level authorization middleware

all

Add authorization checks before processing project mutation requests to verify the authenticated user has proper permissions for the requested project ID.

Rate limiting and monitoring

all

Implement rate limiting on project mutation endpoints and enhance logging to detect suspicious access patterns.

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to the Onlook application to trusted users only
  • Enable detailed audit logging for all project mutation operations and monitor for unauthorized access patterns

🔍 How to Verify

Check if Vulnerable:

Test authenticated API calls to project mutation endpoints with unauthorized project IDs. If requests succeed without proper authorization checks, the system is vulnerable.

Check Version:

Check package.json or application version endpoint for Onlook version 0.2.32

Verify Fix Applied:

Verify that API endpoints now check user permissions for requested project IDs and reject unauthorized requests with appropriate error responses.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts for project mutations
  • Successful project mutations from users not associated with the project
  • Rapid sequence of project update/delete operations

Network Indicators:

  • Unusual patterns of POST/PUT/DELETE requests to project mutation endpoints
  • Requests containing project IDs not associated with the authenticated user

SIEM Query:

source="onlook_app" AND (action="project_update" OR action="project_delete" OR action="project_tag") AND user_id NOT IN project_members

🔗 References

📤 Share & Export