Impact
This vulnerability arises from the homarr‑labs homarr integration.all tRPC endpoint being exposed as a publicProcedure before version 1.54.0. Unauthenticated users can call this endpoint and obtain a comprehensive list of configured integrations, which includes internal service URLs, integration names, and service types. The exposure represents a confidentiality breach in line with CWE‑200 and a missing authorization failure consistent with CWE‑862, potentially allowing attackers to discover sensitive infrastructure details.
Affected Systems
Homarr dashboards running any version prior to 1.54.0, in particular releases up to 1.53.x, are affected. The vendor product homarr‑labs:homarr is the only affected system identified in this advisory.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. EPSS indicates a probability of exploitation less than 1%, and the vulnerability is not yet listed in CISA's KEV catalog, implying low current exploitation likelihood. The likely attack vector is a remote HTTP request to the Homarr instance, which does not require authentication to reach the vulnerable endpoint. Once accessed, the attacker can gather internal URLs and service metadata, potentially facilitating further attacks.
OpenCVE Enrichment