Insecure Direct Object Reference (IDOR)

Vulnerability Details

Severity:

High

Category:

web

Description

The application exposes internal object references (such as database IDs) and fails to verify user authorization before granting access to the referenced objects.

Risks

An attacker could access, modify, or delete data belonging to other users by manipulating object references in API requests or URLs.

Remediation

Implement proper authorization checks for every request. Use indirect references or UUIDs instead of sequential IDs. Validate that the authenticated user has permission to access the requested resource.