flaskBlog is a blog app built with Flask. In 2.8.0 and earlier, the code checks if the userRole is "admin" only when visiting the /admin page, but not when visiting its subroutes. Specifically, only the file routes/adminPanel.py checks the user role when a user is trying to access the admin page, but that control is not done for the pages routes/adminPanelComments.py and routes/adminPanelPosts.py. Thus, an unauthorized user can bypass the intended restrictions, leaking sensitive data and accessing the following pages: /admin/posts, /adminpanel/posts, /admin/comments, and /adminpanel/comments.
References
| Link | Resource |
|---|---|
| https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-h239-vv39-v3vx | Exploit Third Party Advisory |
| https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-jw79-2xvp-76p8 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-08-19 19:15
Updated : 2025-08-22 20:58
NVD link : CVE-2025-55734
Mitre link : CVE-2025-55734
CVE.ORG link : CVE-2025-55734
JSON object : View
Products Affected
dogukanurker
- flaskblog
CWE
CWE-862
Missing Authorization
