Impact
Aegra suffered an IDOR flaw that allows any authenticated attacker who knows another user’s thread_id to trigger graph runs, read the victim’s full checkpoint state, and inject arbitrary messages into the victim’s conversation history. This results in exposed personal data and the ability to alter the victim’s conversation flow, representing a significant breach of confidentiality, integrity, and availability. The weakness corresponds to the absence of proper authorization checks on the /threads/{thread_id}/runs endpoint, reflecting CWE‑285 and CWE‑639.
Affected Systems
The vulnerability affects the Aegra application in all releases prior to version 0.9.7. Instances running on a shared deployment with multiple authenticated users are at risk. No specific vendor product list beyond the Aegra entry is referenced.
Risk and Exploitability
With a CVSS score of 8.6 the complexity of exploitation is low, but the attack vector requires the attacker to be logged in and possess the target’s thread_id. While EPSS data is not available, the high static score and the lack of a public exploit indicate a potentially high risk for organizations that have not upgraded. The vulnerability is not yet listed in the CISA KEV catalog, but the impact warrants urgent attention.
OpenCVE Enrichment
Github GHSA