[Japanese]

JVNDB-2026-000039

Missing authorization in the OpenAI thread/message API endpoints of GROWI

Overview

GROWI provided by GROWI, Inc. contains the following vulnerability.
  • Missing authorization in the OpenAI thread/message API endpoints (CWE-862) - CVE-2026-25083
  • This can be exploited only when an attacker knows a shared AI assistant's identifier
Sho Odagiri of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to GROWI, Inc. and coordinated. After the coordination was completed, GROWI, Inc. reported the case to JPCERT/CC to notify users of the solution through JVN.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 8.3 (High) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: Low
CVSS v4 Severity
Base Metrics: 8.7 (High) [IPA Score]
  • Access Vector (AV): Network
  • Attack Complexity (AC): Low
  • Attack Requirements (AT): None
  • Privileges Required (PR): Low
  • User Interaction (UI): None
  • Vulnerable System Impact
  • Confidentiality Impact (VC): High
  • Integrity Impact (VI): High
  • Availability Impact (VA): Low
  • Subsequent System Impact
  • Confidentiality Impact (SC): None
  • Integrity Impact (SI): None
  • Availability Impact (SA): None
Affected Products


GROWI, Inc.
  • GROWI v7.4.5 and earlier

Impact

A logged-in user may view and/or tamper the other user's threads/messages.
Solution

[Update the Software]
Update the software to the latest version.
The developer has released the following version to address this vulnerability.
  • GROWI v7.4.6
For more details, refer to the information provided by the developer.
Vendor Information

GROWI, Inc.
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2026-25083
References

  1. JVN : JVN#46373837
Revision History

  • [2026/03/16]
      Web page was published