Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.7
INSATutorat allows non-admin users to access sensitive data
GHSA-xfx2-prg5-jq3g
Summary
Non-admin users can still access sensitive data and perform certain actions despite being blocked by the system. This is due to a programming mistake in the INSATutorat application. To fix this, the developers have updated the code to prevent non-admin users from accessing sensitive areas.
What to do
- Update github.com romitou to version 0.0.0-20260226075457-15ae47425aed.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| github.com | romitou | <= 0.0.0-20260226075457-15ae47425aed | 0.0.0-20260226075457-15ae47425aed |
Original title
INSATutorat has an authorization bypass vulnerability in its /api/admin/* endpoints
Original description
### Impact
An authorization bypass vulnerability was discovered in the administration pages of the tutoring application. When a standard user (logged in but without administrator privileges) attempts to access a resource under /api/admin/, the system detects the error but does not block the request.
As a result, sensitive data is still transmitted by the server in the request (GET), and modification actions such as campaign creation (POST) are executed successfully despite the FORBIDDEN error message. All /api/admin/* endpoints are affected.
### Remediation
The issue was resolved by adding the missing c.Abort() instruction in the Gin authentication middleware (commit 15ae474). This instruction immediately interrupts the processing chain if the user is not an administrator.
### Workarounds
There is no workaround other than applying the fix in the source code.
### Resources:
* Link to the fix commit: [15ae474](https://github.com/Romitou/INSATutorat/commit/15ae47425aed337181f7a6c54a9d199c93b041eb)
### Credits
INSATutorat thanks the Master 2 SSI 25-26 team at the University of Rouen Normandie for their research work on this project.
- Malak Bekkai
- Matthieu Espada Mora
- Amen Allah Khalf Allah
- Liam Laouenan
- Neila Ould Slimane
- Lucas Thomire
This advisory was translated from French to English by GitHub Copilot.
An authorization bypass vulnerability was discovered in the administration pages of the tutoring application. When a standard user (logged in but without administrator privileges) attempts to access a resource under /api/admin/, the system detects the error but does not block the request.
As a result, sensitive data is still transmitted by the server in the request (GET), and modification actions such as campaign creation (POST) are executed successfully despite the FORBIDDEN error message. All /api/admin/* endpoints are affected.
### Remediation
The issue was resolved by adding the missing c.Abort() instruction in the Gin authentication middleware (commit 15ae474). This instruction immediately interrupts the processing chain if the user is not an administrator.
### Workarounds
There is no workaround other than applying the fix in the source code.
### Resources:
* Link to the fix commit: [15ae474](https://github.com/Romitou/INSATutorat/commit/15ae47425aed337181f7a6c54a9d199c93b041eb)
### Credits
INSATutorat thanks the Master 2 SSI 25-26 team at the University of Rouen Normandie for their research work on this project.
- Malak Bekkai
- Matthieu Espada Mora
- Amen Allah Khalf Allah
- Liam Laouenan
- Neila Ould Slimane
- Lucas Thomire
This advisory was translated from French to English by GitHub Copilot.
ghsa CVSS4.0
8.7
Vulnerability type
CWE-285
Improper Authorization
Published: 1 Mar 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026