Skip to content

x/vulndb: potential Go vuln in github.com/l3montree-dev/devguard: GHSA-2g9v-7mr5-fgjg #4988

@GoVulnBot

Description

@GoVulnBot

Advisory GHSA-2g9v-7mr5-fgjg references a vulnerability in the following Go modules:

Module
github.com/l3montree-dev/devguard

Description:

Impact

The SessionMiddleware accepts a client-supplied X-Admin-Token HTTP request header and uses its raw string value as the authenticated userID when no Kratos session cookie is present. An unauthenticated attacker who knows or can guess a target user's Kratos identity UUID can issue requests as that user. Where the target user is an organisation admin or owner, this gives the attacker full control over that organisation's DevGuard resources.

Patches

The release v1.2.2 patches this issue. Update your DevGuard API Instances to this version.

Workarounds

Configure a reve...

References:

No existing reports found with this module or alias.
See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/l3montree-dev/devguard
      versions:
        - fixed: 1.2.2
      vulnerable_at: 1.2.1
summary: DevGuard has an unauthenticated identity assertion via `X-Admin-Token` header in github.com/l3montree-dev/devguard
cves:
    - CVE-2026-42300
ghsas:
    - GHSA-2g9v-7mr5-fgjg
references:
    - advisory: https://github.com/advisories/GHSA-2g9v-7mr5-fgjg
    - advisory: https://github.com/l3montree-dev/devguard/security/advisories/GHSA-2g9v-7mr5-fgjg
    - fix: https://github.com/l3montree-dev/devguard/commit/6f38310bf93b2a63df3055038f4da82b1f4e6d9a
source:
    id: GHSA-2g9v-7mr5-fgjg
    created: 2026-05-05T21:03:01.937637804Z
review_status: UNREVIEWED

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions