CVE-2026-23487
Received Received - Intake
IDOR Vulnerability in Blinko Exposes Superadmin Token

Publication date: 2026-03-23

Last updated on: 2026-03-24

Assigner: GitHub, Inc.

Description
Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, there is an IDOR vulnerability where user.detail Endpoint Leaks the Superadmin Token. This issue has been patched in version 1.8.4.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-23
Last Modified
2026-03-24
Generated
2026-05-07
AI Q&A
2026-03-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
blinko blinko to 1.8.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-23487 is an Insecure Direct Object Reference (IDOR) vulnerability in the Blinko application affecting the GET /api/v1/user/detail endpoint. The vulnerability arises from a flawed authorization check that allows any authenticated user who knows the superadmin's user ID to retrieve the superadmin's permanent API token. This happens because the code incorrectly permits access when the requested user is a superadmin, regardless of the caller's privileges."}, {'type': 'paragraph', 'content': "Specifically, the endpoint accepts a user ID and returns user details including sensitive API tokens. The authorization logic checks if the requested user ID matches the caller's ID or if the requested user has the role 'superadmin'. However, this logic allows bypassing authorization by requesting the superadmin's user ID, commonly 1, enabling unauthorized access to the superadmin token."}] [1]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability allows any authenticated user who knows the superadmin's user ID to obtain the superadmin's API token, leading to immediate privilege escalation to superadmin level."}, {'type': 'list_item', 'content': 'Unauthorized access to all superadmin operations.'}, {'type': 'list_item', 'content': 'Potential execution of remote code on the management control panel (MCP).'}, {'type': 'list_item', 'content': "Compromise of the entire system's security due to elevated privileges."}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "The vulnerability involves unauthorized access to the superadmin's API token via the `GET /api/v1/user/detail` endpoint by any authenticated user who knows the superadmin's user ID."}, {'type': 'paragraph', 'content': 'To detect exploitation attempts on your system or network, you can monitor requests to the `/api/v1/user/detail` endpoint that include user ID parameters corresponding to the superadmin (commonly user ID 1) coming from non-superadmin users.'}, {'type': 'paragraph', 'content': 'Suggested commands to detect such activity include:'}, {'type': 'list_item', 'content': 'Using web server logs (e.g., nginx or Apache) to search for requests to the vulnerable endpoint with superadmin user ID:'}, {'type': 'list_item', 'content': "grep '/api/v1/user/detail' /var/log/nginx/access.log | grep 'userId=1'"}, {'type': 'list_item', 'content': 'Using network monitoring tools like tcpdump or Wireshark to filter HTTP GET requests to the endpoint:'}, {'type': 'list_item', 'content': "tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep '/api/v1/user/detail'"}, {'type': 'list_item', 'content': 'Checking application logs for authorization failures or suspicious access patterns related to user detail requests.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'The vulnerability has been patched in Blinko version 1.8.4. The immediate mitigation step is to upgrade your Blinko installation to version 1.8.4 or later.'}, {'type': 'paragraph', 'content': 'If upgrading immediately is not possible, consider the following temporary mitigations:'}, {'type': 'list_item', 'content': 'Restrict access to the `/api/v1/user/detail` endpoint to only trusted users or IP addresses.'}, {'type': 'list_item', 'content': "Implement additional access control checks at the network or application firewall level to prevent unauthorized users from querying other users' details."}, {'type': 'list_item', 'content': 'Monitor logs for suspicious requests targeting the superadmin user ID and respond accordingly.'}, {'type': 'paragraph', 'content': 'Ultimately, applying the official patch that enforces strict access control and prevents leakage of the superadmin API token is the recommended solution.'}] [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart