CVE-2026-40196

| EUVD-2026-23539 HIGH
2026-04-17 GitHub_M
8.1
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

2
patch_available
Apr 17, 2026 - 22:16 EUVD
Analysis Generated
Apr 17, 2026 - 21:38 vuln.today

DescriptionNVD

HomeBox is a home inventory and organization system. Versions prior to 0.25.0 contain a vulnerability where the defaultGroup ID remained permanently assigned to a user after being invited to a group, even after their access to that group was revoked. While the web interface correctly enforced the access revocation and prevented the user from viewing or modifying the group's contents, the API did not. Because the original group ID persisted as the user's defaultGroup, and this value was not properly validated when the X-Tenant header was omitted, the user could still perform full CRUD operations on the group's collections through the API, bypassing the intended access controls. This issue has been fixed in version 0.25.0.

AnalysisAI

Broken access control in HomeBox prior to 0.25.0 allows authenticated users with revoked group access to continue performing full CRUD operations via API. After group invitation revocation, the defaultGroup ID persists on the user object, and when API requests omit the X-Tenant header, this unvalidated value enables bypassing access controls to read, modify, and delete group inventory data. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Audit HomeBox instances to identify all current deployments and versions below 0.25.0; notify users with revoked group access that their API permissions may not reflect web interface restrictions. Within 7 days: Implement API request monitoring to detect calls omitting the X-Tenant header from revoked users; restrict API access via network controls or Web Application Firewall rules until HomeBox 0.25.0 is available. …

Sign in for detailed remediation steps.

Share

CVE-2026-40196 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy