CVE-2019-16403:
Authorization Bypass Through User-Controlled Key in Bagisto
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.52844%
CWE
Published
11/8/2019
Updated
2/1/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
bagisto/bagisto | composer | < 0.1.5 | 0.1.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing authorization checks on user-controlled resource IDs in customer-facing endpoints. Based on the issue report's reproduction steps and affected routes (/addresses/edit, /reviews/delete, /orders/view), the corresponding controller methods likely directly use user-provided IDs (item_value
) to perform operations without verifying resource ownership. This matches the CWE-639 pattern where user-controlled keys enable authorization bypass. Confidence is high due to the specific endpoint-to-controller mapping in Laravel
applications and the vulnerability's reproducibility through ID manipulation.