Avo is a framework to create admin panels for Ruby on Rails apps. Prior to version 3.31.2, a broken access control vulnerability was identified in the ActionsController of the Avo framework. Due to insecure action lookup logic, an authenticated user can execute any Action class (descendants of Avo::BaseAction) on any resource, even if the action is not registered for that specific resource. This leads to Privilege Escalation and unauthorized data manipulation across the entire application. This issue has been patched in version 3.31.2.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qc5p-3mg5-9fh8 | Avo: Broken Access Control Through Unauthorized Execution of Arbitrary Action Classes Across Resources |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 08 May 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Avo Hq
Avo Hq avo |
|
| Vendors & Products |
Avo Hq
Avo Hq avo |
Fri, 08 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Avo is a framework to create admin panels for Ruby on Rails apps. Prior to version 3.31.2, a broken access control vulnerability was identified in the ActionsController of the Avo framework. Due to insecure action lookup logic, an authenticated user can execute any Action class (descendants of Avo::BaseAction) on any resource, even if the action is not registered for that specific resource. This leads to Privilege Escalation and unauthorized data manipulation across the entire application. This issue has been patched in version 3.31.2. | |
| Title | Avo: Broken Access Control: Unauthorized Execution of Arbitrary Action Classes Across Resources | |
| Weaknesses | CWE-284 CWE-639 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T21:26:44.743Z
Reserved: 2026-04-25T05:04:37.027Z
Link: CVE-2026-42205
No data.
Status : Received
Published: 2026-05-08T22:16:31.820
Modified: 2026-05-08T22:16:31.820
Link: CVE-2026-42205
No data.
OpenCVE Enrichment
Updated: 2026-05-08T23:15:20Z
Github GHSA