The vulnerability, identified as GHSA-c869-jx4c-q5fc, is an authorization bypass in FUXA's scheduler functionality. The analysis of the patch commit aced6ad0b6089eea4e5cef51c0a88bf4f308d45f reveals that the core issue was missing authorization checks in the API endpoints responsible for managing schedulers.
The vulnerability allowed an unauthenticated attacker to obtain a 'guest' session token and then use this token to perform privileged actions. The patch addresses this by introducing a new helper function, isGuestUser, in server/api/jwt-helper.js to identify guest users.
This helper is then used in server/api/scheduler/index.js to add explicit authorization checks to the POST and DELETE handlers for the /api/scheduler route. Before the patch, these handlers would process requests without verifying if the user was a guest, thus allowing unauthorized creation, modification, and deletion of schedulers. The patch ensures that if security is enabled, any attempt by a guest user to access these endpoints results in a 401 Unauthorized error. The vulnerable functions are the Express.js route handlers for POST /api/scheduler and DELETE /api/scheduler.