Impact
OpenViking versions before 0.3.3 suffer from a missing authorization flaw on the task polling endpoints. Attackers can request /api/v1/tasks and /api/v1/tasks/{task_id} without any credentials, which returns detailed metadata about background tasks created by other users. The disclosed data includes task type, status, resource identifiers, archive URIs, result payloads, and error messages. In multi‑tenant deployments this enables cross‑tenant data exposure and can reveal sensitive information about other users’ operations.
Affected Systems
Known affected vendor is Volcengine, specifically the OpenViking project. All releases prior to 0.3.3 are impacted; versions 0.3.3 and later contain the authorization guard that protects the task polling routes. The vulnerability pertains only to the OpenViking codebase, not to other Volcengine products.
Risk and Exploitability
The CVSS base score of 6.9 places this issue in the medium‑to‑high severity range. No EPSS data is available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires only network access to the OpenViking API and does not depend on privileged credentials; therefore any unauthenticated user can enumerate tasks. The lack of an authentication check is the sole prerequisite, making the attack vector straightforward and the risk moderate to high for environments exposing the API to untrusted networks.
OpenCVE Enrichment
Github GHSA