Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. avo
  4. ›
  5. GHSA-qc5p-3mg5-9fh8

GHSA-qc5p-3mg5-9fh8: Avo: Broken Access Control Through Unauthorized Execution of Arbitrary Action Classes Across Resources

April 24, 2026

A critical Broken Access Control vulnerability was identified in the ActionsController of the Avo framework (v3.x). Due to insecure action lookup logic, an authenticated user can execute any Action class (descendants of Avo::BaseAction) on any resource, even if the action is not registered for that specific resource. This leads to Privilege Escalation and unauthorized data manipulation across the entire application.

References

  • github.com/advisories/GHSA-qc5p-3mg5-9fh8
  • github.com/avo-hq/avo
  • github.com/avo-hq/avo/security/advisories/GHSA-qc5p-3mg5-9fh8

Code Behaviors & Features

Detect and mitigate GHSA-qc5p-3mg5-9fh8 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.31.2

Fixed versions

  • 3.31.2

Solution

Upgrade to version 3.31.2 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-284: Improper Access Control
  • CWE-639: Authorization Bypass Through User-Controlled Key

Source file

gem/avo/GHSA-qc5p-3mg5-9fh8.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:48 +0000.