Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w65c-cmxj-qrhm | Wooey has an Incorrect Privilege Assignment issue |
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wooey
Wooey wooey |
|
| Vendors & Products |
Wooey
Wooey wooey |
Mon, 27 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Wooey up to 0.13.2. The impacted element is the function add_or_update_script of the file wooey/api/scripts.py of the component API Endpoint. Executing a manipulation can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 0.13.3rc1 and 0.14.0 is sufficient to resolve this issue. This patch is called f7846fc0c323da8325422cab32623491757f1b88. The affected component should be upgraded. | |
| Title | Wooey API Endpoint scripts.py add_or_update_script improper authorization | |
| Weaknesses | CWE-266 CWE-285 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-27T20:12:13.840Z
Reserved: 2026-04-26T19:42:42.726Z
Link: CVE-2026-7142
Updated: 2026-04-27T19:39:21.939Z
Status : Deferred
Published: 2026-04-27T17:16:45.820
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-7142
No data.
OpenCVE Enrichment
Updated: 2026-04-28T09:17:01Z
Github GHSA