Impact
The vulnerability is an improper authorization flaw in the page content retrieval feature of Connect CMS. An attacker who can target the CMS web interface may request the content of any page, regardless of whether the page is set to private. This permits disclosure of confidential or otherwise sensitive information that should only be visible to authenticated, authorized users. The weakness is a classic access control bypass (CWE‑284).
Affected Systems
Affected versions include all releases of the 1.x series up to and including 1.41.0 and all releases of the 2.x series up to and including 2.41.0. The vendor, OpenSource‑Workshop, released a fix in version 1.41.1 for the 1.x series and version 2.41.1 for the 2.x series. Systems running any earlier release are vulnerable.
Risk and Exploitability
The CVSS base score of 7.5 indicates high severity, but the EPSS score of less than 1% suggests a low likelihood of current exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit this flaw by sending crafted requests to the CMS page retrieval endpoint over the network. Because the flaw is purely an authorization bypass, no local privilege escalation or code execution is required, yet the confidentiality impact is significant. The likely attack vector is remote via the web interface.
OpenCVE Enrichment
Github GHSA