Authorization Flaw in GROWI OpenAI API Endpoints by GROWI
CVE-2026-25083

8.7HIGH

Key Information:

Status
Vendor
CVE Published:
16 March 2026

What is CVE-2026-25083?

The GROWI OpenAI thread/message API endpoints lack proper authorization checks, allowing unauthorized users to access and modify threads or messages belonging to others. This significantly compromises user data security, as a logged-in user aware of a shared AI assistant's identifier can exploit this vulnerability, potentially leading to unauthorized access to sensitive information. It is crucial for users of GROWI OpenAI to review their usage guidelines and implement necessary security measures.

Affected Version(s)

GROWI v7.4.5 and earlier

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

CVSS V3.0

Score:
8.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.