<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Access Control on gryfman</title><link>https://gryfman.fr/tags/access-control/</link><description>Recent content in Access Control on gryfman</description><generator>Hugo</generator><language>en-us</language><managingEditor>sussetnoe2004@gmail.com (gryfman)</managingEditor><webMaster>sussetnoe2004@gmail.com (gryfman)</webMaster><lastBuildDate>Mon, 27 Apr 2026 00:00:04 +0200</lastBuildDate><atom:link href="https://gryfman.fr/tags/access-control/index.xml" rel="self" type="application/rss+xml"/><item><title>When guest takes over : CVE-2026-41464</title><link>https://gryfman.fr/cves/cve-2026-41464/</link><pubDate>Mon, 27 Apr 2026 00:00:04 +0200</pubDate><author>sussetnoe2004@gmail.com (gryfman)</author><guid>https://gryfman.fr/cves/cve-2026-41464/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;This article covers another vulnerability we found during our research on ProjeQtOr: a missing authorization issue.&lt;/p&gt;
&lt;p&gt;If you want more context about ProjeQtOr itself, I already introduced the software in the first post of this series: 
&lt;a href="https://gryfman.fr/cves/cve-2026-41462"&gt;From login to admin : CVE-2026-41462&lt;/a&gt;
.&lt;/p&gt;
&lt;p&gt;Here the issue is differents from the previous ones, and involves an access control flaw that allowed low-privileged authenticated users to access sensitive information about other users, including password hashes and API keys.&lt;/p&gt;</description></item></channel></rss>