Description
Brave CMS is an open-source CMS. Prior to 2.0.6, an Insecure Direct Object Reference (IDOR) vulnerability exists in the article image deletion feature. It is located in app/Http/Controllers/Dashboard/ArticleController.php within the deleteImage method. The endpoint accepts a filename from the URL but does not verify ownership. This allows an authenticated user with edit permissions to delete images attached to articles owned by other users. This vulnerability is fixed in 2.0.6.
Published: 2026-04-06
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Deletion of Article Images
Action: Immediate Patch
AI Analysis

Impact

Brave CMS contains an insecure direct object reference that enables an authenticated user with edit permissions to delete images attached to articles belonging to other users. The flaw lies in the deleteImage method of the ArticleController, which receives a filename from the URL without verifying the owner. This lack of ownership validation allows the deletion of image files that may be critical to other authors’ content, leading to integrity loss and potential disruption of publications.

Affected Systems

The vulnerability affects the Ajax30 BraveCMS 2.0 series prior to version 2.0.6. Any deployment of Brave CMS containers or installations based on the 2.0 release that have not applied the 2.0.6 patch is susceptible. Users should verify their version, and the patch is available in the 2.0.6 update released by the vendor.

Risk and Exploitability

The CVSS score of 7.1 indicates medium‑to‑high severity. The vulnerability requires the attacker to be an authenticated user with edit rights; this is typical of CMS editors or authors. Exploitation involves sending a crafted URL to the deleteImage endpoint with a target image’s filename, which the application then deletes without permission checks. Since the EPSS score is unavailable and the issue is not listed in KEV, the risk is based primarily on the reported severity and the preponderance of user accounts with edit privileges. The attack vector is inferred to be remote, via the web interface, as the deletion request is performed over HTTP/HTTPS.

Generated by OpenCVE AI on April 7, 2026 at 01:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Brave CMS to version 2.0.6 or later to remove the IDOR flaw.
  • If immediate upgrade is not possible, restrict edit permissions so that only image owners can perform deletion actions.
  • Modify the deleteImage endpoint to verify that the authenticated user is the owner of the article image before allowing deletion.
  • Monitor logs for unauthorized deletion attempts and review user activity related to image management.

Generated by OpenCVE AI on April 7, 2026 at 01:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Ajax30
Ajax30 bravecms-2.0
Vendors & Products Ajax30
Ajax30 bravecms-2.0

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description Brave CMS is an open-source CMS. Prior to 2.0.6, an Insecure Direct Object Reference (IDOR) vulnerability exists in the article image deletion feature. It is located in app/Http/Controllers/Dashboard/ArticleController.php within the deleteImage method. The endpoint accepts a filename from the URL but does not verify ownership. This allows an authenticated user with edit permissions to delete images attached to articles owned by other users. This vulnerability is fixed in 2.0.6.
Title Brave CMS has an Insecure Direct Object Reference in Article Image Deletion
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L'}


Subscriptions

Ajax30 Bravecms-2.0
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T16:14:01.519Z

Reserved: 2026-04-01T17:26:21.133Z

Link: CVE-2026-35183

cve-icon Vulnrichment

Updated: 2026-04-07T16:13:50.991Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-06T20:16:26.727

Modified: 2026-04-07T13:20:11.643

Link: CVE-2026-35183

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:37:31Z

Weaknesses