CVE-2024-52294

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-52294
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-52294.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-52294
Aliases
Published
2024-12-30T16:14:35Z
Modified
2025-10-22T18:44:37.645544Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
khoj has an IDOR in subscription management that allows unauthorized subscription modifications
Details

Khoj is a self-hostable artificial intelligence app. Prior to version 1.29.10, an Insecure Direct Object Reference (IDOR) vulnerability in the update_subscription endpoint allows any authenticated user to manipulate other users' Stripe subscriptions by simply modifying the email parameter in the request. The vulnerability exists in the subscription endpoint at /api/subscription. The endpoint uses an email parameter as a direct reference to user subscriptions without verifying object ownership. While authentication is required, there is no authorization check to verify if the authenticated user owns the referenced subscription. The issue was fixed in version 1.29.10. Support for arbitrarily presenting an email for update has been deprecated.

Database specific
{
    "cwe_ids": [
        "CWE-639"
    ]
}
References

Affected packages

Git / github.com/khoj-ai/khoj

Affected ranges

Type
GIT
Repo
https://github.com/khoj-ai/khoj
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.10.0
0.10.1
0.11.0
0.11.1
0.11.2
0.11.3
0.11.4
0.12.0
0.12.1
0.12.2
0.12.3
0.13.0
0.14.0
0.2.1
0.2.5
0.2.6
0.3.0
0.4.0
0.5.0
0.6.0
0.6.1
0.6.2
0.7.0
0.7.1
0.8.0
0.8.1
0.8.2
0.9.0

1.*

1.0.0
1.0.1
1.1.0
1.10.0
1.10.1
1.10.2
1.11.0
1.11.1
1.11.2
1.12.0
1.12.1
1.13.0
1.14.0
1.15.0
1.16.0
1.17.0
1.2.0
1.2.1
1.20.0
1.20.1
1.20.2
1.20.3
1.20.4
1.21.0
1.21.1
1.21.2
1.21.3
1.21.4
1.21.5
1.21.6
1.22.0
1.22.1
1.22.2
1.22.3
1.23.0
1.23.1
1.23.2
1.23.3
1.24.0
1.24.1
1.25.0
1.26.0
1.26.1
1.26.2
1.26.3
1.26.4
1.27.0
1.27.1
1.28.0
1.28.1
1.28.2
1.28.3
1.3.0
1.4.0
1.5.0
1.5.1
1.6.0
1.6.1
1.7.0
1.8.0
1.9.0

Other

rm

v0.*

v0.1.5-alpha
v0.1.6
v0.1.7
v0.1.8
v0.1.9
v0.2.0