{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T07:50:29.724","vulnerabilities":[{"cve":{"id":"CVE-2024-55954","sourceIdentifier":"security-advisories@github.com","published":"2025-01-16T20:15:32.890","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"OpenObserve is a cloud-native observability platform. A vulnerability in the user management endpoint `/api/{org_id}/users/{email_id}` allows an \"Admin\" role user to remove a \"Root\" user from the organization. This violates the intended privilege hierarchy, enabling a non-root user to remove the highest-privileged account. Due to insufficient role checks, the `remove_user_from_org` function does not prevent an \"Admin\" user from removing a \"Root\" user. As a result, an attacker with an \"Admin\" role can remove critical \"Root\" users, potentially gaining effective full control by eliminating the highest-privileged accounts. The `DELETE /api/{org_id}/users/{email_id}` endpoint is affected. This issue has been addressed in release version `0.14.1` and all users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"OpenObserve es una plataforma de observación nativa de la nube. Una vulnerabilidad en el punto de conexión de administración de usuarios `/api/{org_id}/users/{email_id}` permite que un usuario con el rol \"Admin\" elimine a un usuario \"Root\" de la organización. Esto viola la jerarquía de privilegios prevista, lo que permite que un usuario que no sea root elimine la cuenta con los privilegios más altos. Debido a que no se realizan suficientes comprobaciones de roles, la función `remove_user_from_org` no impide que un usuario \"Admin\" elimine a un usuario \"Root\". Como resultado, un atacante con un rol \"Admin\" puede eliminar usuarios \"Root\" críticos, lo que podría generar un control total efectivo al eliminar las cuentas con los privilegios más altos. El punto de conexión `DELETE /api/{org_id}/users/{email_id}` se ve afectado. Este problema se ha solucionado en la versión de lanzamiento `0.14.1` y se recomienda a todos los usuarios que la actualicen. No existen workarounds conocidos para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N","baseScore":8.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":5.8}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-269"},{"lang":"en","value":"CWE-272"},{"lang":"en","value":"CWE-284"},{"lang":"en","value":"CWE-285"},{"lang":"en","value":"CWE-287"}]}],"references":[{"url":"https://github.com/gaby/openobserve/blob/main/src/service/users.rs#L631","source":"security-advisories@github.com"},{"url":"https://github.com/openobserve/openobserve/security/advisories/GHSA-m8gj-6r85-3r6m","source":"security-advisories@github.com"}]}}]}