CVE-2026-25729

6.5 MEDIUM

📋 TL;DR

DeepAudit versions 3.0.4 and earlier contain an improper access control vulnerability in the /api/v1/users/ endpoint that allows any authenticated user to enumerate all system users and retrieve sensitive personal information. This affects all deployments of DeepAudit 3.0.4 and earlier where the API is accessible.

💻 Affected Systems

Products:
  • DeepAudit
Versions: 3.0.4 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments where the API endpoint is accessible and authentication is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could harvest sensitive user data (emails, phone numbers, roles) for targeted phishing, social engineering, or credential stuffing attacks, potentially leading to account compromise and privilege escalation.

🟠

Likely Case

Authenticated users (including low-privilege accounts) can access the complete user directory, exposing PII and organizational structure information.

🟢

If Mitigated

With proper access controls, only authorized administrators can access user information, limiting exposure to sensitive data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is trivial via simple HTTP requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit b2a3b26579d3fdbab5236ae12ed67ae2313175fd

Vendor Advisory: https://github.com/lintsinghua/DeepAudit/security/advisories/GHSA-vmmm-48w2-q56q

Restart Required: Yes

Instructions:

1. Update to the latest DeepAudit version containing commit b2a3b26579d3fdbab5236ae12ed67ae2313175fd. 2. Restart the DeepAudit service. 3. Verify the fix by testing user enumeration.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict access to the /api/v1/users/ endpoint using firewall rules or web application firewalls.

iptables -A INPUT -p tcp --dport <api_port> -m string --string "/api/v1/users/" --algo bm -j DROP

Authentication Bypass Prevention

all

Implement additional authorization checks at the application level or proxy layer.

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to the DeepAudit API to authorized users only.
  • Deploy a web application firewall (WAF) with rules to block requests to the vulnerable endpoint.

🔍 How to Verify

Check if Vulnerable:

As an authenticated user, send a GET request to /api/v1/users/ and check if it returns user data beyond your own.

Check Version:

Check DeepAudit version in web interface or configuration files, or run: grep -i version /path/to/deepaudit/config/*

Verify Fix Applied:

After patching, authenticated users should receive 403 Forbidden or only see their own data when accessing /api/v1/users/.

📡 Detection & Monitoring

Log Indicators:

  • Multiple GET requests to /api/v1/users/ from single user
  • Unusual user enumeration patterns in access logs

Network Indicators:

  • HTTP traffic to /api/v1/users/ endpoint with successful (200) responses

SIEM Query:

source="deepaudit_logs" AND uri_path="/api/v1/users/" AND http_method="GET" AND status_code=200 | stats count by src_ip

🔗 References

📤 Share & Export