| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jmrh-xmgh-x9j4 | changedetection.io Vulnerable to Authentication Bypass via Decorator Ordering |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dgtlmoon
Dgtlmoon changedetection.io |
|
| Vendors & Products |
Dgtlmoon
Dgtlmoon changedetection.io |
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | changedetection.io is a free open source web page change detection tool. Prior to 0.54.8, the @login_optionally_required decorator is placed before (outer to) @blueprint.route() instead of after it. In Flask, @route() must be the outermost decorator because it registers the function it receives. When the order is reversed, @route() registers the original undecorated function, and the auth wrapper is never in the call chain. This silently disables authentication on these routes. This vulnerability is fixed in 0.54.8. | |
| Title | changedetection.io has an Authentication Bypass via Decorator Ordering | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-09T14:37:01.267Z
Reserved: 2026-04-02T20:49:44.454Z
Link: CVE-2026-35490
Updated: 2026-04-09T14:36:52.416Z
Status : Undergoing Analysis
Published: 2026-04-07T16:16:27.317
Modified: 2026-04-09T15:16:12.097
Link: CVE-2026-35490
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:48:34Z
Github GHSA