Minder is a software supply chain security platform. Prior to version 0.0.33, a Minder user can use the endpoints `GetRepositoryByName`, `DeleteRepositoryByName`, and `GetArtifactByName` to access any repository in the database, irrespective of who owns the repo and any permissions present. The database query checks by repo owner, repo name and provider name (which is always `github`). These query values are not distinct for the particular user - as long as the user has valid credentials and a provider, they can set the repo owner/name to any value they want and the server will return information on this repo. Version 0.0.33 contains a patch for this issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-1009 Minder is a software supply chain security platform. Prior to version 0.0.33, a Minder user can use the endpoints `GetRepositoryByName`, `DeleteRepositoryByName`, and `GetArtifactByName` to access any repository in the database, irrespective of who owns the repo and any permissions present. The database query checks by repo owner, repo name and provider name (which is always `github`). These query values are not distinct for the particular user - as long as the user has valid credentials and a provider, they can set the repo owner/name to any value they want and the server will return information on this repo. Version 0.0.33 contains a patch for this issue.
Github GHSA Github GHSA GHSA-v627-69v2-xx37 `GetRepositoryByName`, `DeleteRepositoryByName` and `GetArtifactByName` allow access of arbitrary repositories in Minder by any authenticated user
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 02 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Lfprojects
Lfprojects minder
CPEs cpe:2.3:a:lfprojects:minder:*:*:*:*:*:go:*:*
Vendors & Products Lfprojects
Lfprojects minder

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T19:39:30.349Z

Reserved: 2024-02-28T15:14:14.213Z

Link: CVE-2024-27916

cve-icon Vulnrichment

Updated: 2024-08-02T00:41:55.808Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-21T02:52:20.617

Modified: 2026-01-02T14:28:13.803

Link: CVE-2024-27916

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses