Impact
The Tuist DELETE /api/projects/{account_handle}/{project_handle}/previews/{preview_id} endpoint loads a preview by its UUID without ensuring it belongs to the project specified in the URL. This IDOR flaw allows an authenticated attacker to supply any preview UUID and delete any preview owned by a different tenant, resulting in unintended data loss. The vulnerability is tied to a missing authorization check (CWE-639). The likely attack vector is a remote API call performed after authenticating, where the attacker crafts a request with a victim’s preview UUID and any project identifiers in the URL path.
Affected Systems
This issue exists in Tuist 1.180.8 and earlier. Users running these versions and exposing the preview deletion API are at risk.
Risk and Exploitability
The CVSS base score of 7.1 indicates high severity. EPSS data is not available, so exploitation likelihood is indeterminate, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker must first authenticate with the Tuist API and then send a crafted DELETE request with an unrelated preview UUID. No local or privileged access is required beyond normal API permissions.
OpenCVE Enrichment