Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-25083

CVE-2026-25083: GROWI Auth Bypass Vulnerability

CVE-2026-25083 is an authorization bypass flaw in GROWI's OpenAI thread/message API endpoints that allows logged-in users to access other users' AI assistant threads. This article covers technical details, impact, and fixes.

Published: March 20, 2026

CVE-2026-25083 Overview

CVE-2026-25083 is a Missing Authorization vulnerability affecting GROWI, an open-source wiki platform. The OpenAI thread/message API endpoints in GROWI fail to perform proper authorization checks, allowing authenticated users who know a shared AI assistant's identifier to view and tamper with other users' threads and messages. This authorization bypass (CWE-862) affects GROWI versions 7.4.5 and earlier.

Critical Impact

Authenticated attackers can access and modify other users' AI assistant conversations, potentially exposing sensitive information shared in private threads and enabling tampering with AI-generated content.

Affected Products

  • GROWI v7.4.5 and earlier versions
  • GROWI OpenAI integration module
  • All GROWI installations with AI assistant functionality enabled

Discovery Timeline

  • 2026-03-16 - CVE CVE-2026-25083 published to NVD
  • 2026-03-16 - Last updated in NVD database

Technical Details for CVE-2026-25083

Vulnerability Analysis

This vulnerability stems from a fundamental flaw in the authorization logic of GROWI's OpenAI integration API. The affected endpoints responsible for managing AI assistant threads and messages fail to verify that the requesting user has appropriate permissions to access the requested resources. While the application requires users to be logged in (authentication is present), it does not verify whether the authenticated user is authorized to access specific threads or messages belonging to other users.

The vulnerability enables horizontal privilege escalation, where an attacker with valid credentials can access resources belonging to other users at the same privilege level. The attack requires knowledge of a shared AI assistant's identifier, which may be discoverable through enumeration or leaked through other means.

Root Cause

The root cause is Missing Authorization (CWE-862) in the OpenAI thread/message API endpoints. The application fails to implement proper access control checks to verify that the requesting user owns or has permission to access the specified thread or message resources. This is a classic Broken Access Control vulnerability where object-level authorization is not enforced.

Attack Vector

The attack is network-based and requires low privileges (authenticated user account). An attacker with a valid user session can exploit this vulnerability by directly accessing API endpoints for threads and messages associated with a shared AI assistant identifier. The attacker does not require any user interaction to exploit this flaw.

The exploitation process involves:

  1. Authenticating to the GROWI application with valid credentials
  2. Obtaining or guessing a shared AI assistant identifier
  3. Making direct API requests to thread/message endpoints with the target identifier
  4. Viewing confidential conversation data or modifying existing messages

Since no verified code examples are available for this vulnerability, organizations should consult the JVN Security Advisory JVN46373837 for detailed technical information about the affected API endpoints and exploitation mechanics.

Detection Methods for CVE-2026-25083

Indicators of Compromise

  • Unusual API access patterns to OpenAI thread/message endpoints from single user accounts accessing multiple different AI assistant identifiers
  • Log entries showing authenticated users accessing thread resources they did not create
  • Anomalous read/write operations on AI assistant conversations outside normal usage patterns
  • Multiple failed or successful API calls to thread endpoints with sequential or enumerated identifiers

Detection Strategies

  • Implement application-level logging for all OpenAI API endpoint access, including user ID, requested resource ID, and action performed
  • Monitor for users accessing thread/message resources associated with AI assistants they have not interacted with before
  • Configure alerts for high-volume API requests to thread/message endpoints from individual user accounts
  • Review access logs for patterns indicating identifier enumeration attempts

Monitoring Recommendations

  • Enable detailed audit logging for all AI assistant-related API endpoints in GROWI
  • Deploy web application firewall (WAF) rules to detect and alert on suspicious API access patterns
  • Implement rate limiting on thread/message API endpoints to slow enumeration attempts
  • Regularly review application logs for unauthorized access attempts to AI conversation resources

How to Mitigate CVE-2026-25083

Immediate Actions Required

  • Update GROWI to the latest patched version that addresses this authorization vulnerability
  • Audit existing AI assistant threads and messages for evidence of unauthorized access
  • Review and restrict access to shared AI assistant identifiers until the patch is applied
  • Consider temporarily disabling the OpenAI integration feature if immediate patching is not possible

Patch Information

GROWI has released a security update addressing this vulnerability. Organizations should update to the latest version as soon as possible. For detailed patch information and upgrade instructions, refer to the Growi News Update and the JVN Security Advisory JVN46373837.

Workarounds

  • Disable the OpenAI/AI assistant integration feature until the patch can be applied
  • Implement network-level access controls to restrict API endpoint access to trusted networks
  • Use a reverse proxy or WAF to add authorization checks at the network layer for affected endpoints
  • Review and minimize the number of users with access to shared AI assistants

Organizations unable to immediately patch should implement network segmentation and enhanced monitoring while planning their upgrade path. Contact GROWI support for additional guidance on securing installations prior to patching.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechGrowi

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-862
  • Technical References
  • Growi News Update

  • JVN Security Advisory JVN46373837
  • Related CVEs
  • CVE-2026-41040: GROWI ReDoS Denial of Service Vulnerability

  • CVE-2026-26291: GROWI Stored XSS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English