{"id":"CVE-2022-31178","summary":"Improper Authorization in eLabFTW","details":"eLabFTW is an electronic lab notebook manager for research teams. A vulnerability was discovered which allows a logged in user to read a template without being authorized to do so. This vulnerability has been patched in 4.3.4. Users are advised to upgrade. There are no known workarounds for this issue.","aliases":["GHSA-63qq-hw97-8q7x"],"modified":"2026-04-18T04:12:50.582015Z","published":"2022-08-01T19:10:11Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/31xxx/CVE-2022-31178.json","cwe_ids":["CWE-863"],"cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/31xxx/CVE-2022-31178.json"},{"type":"ADVISORY","url":"https://github.com/elabftw/elabftw/security/advisories/GHSA-63qq-hw97-8q7x"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31178"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/elabftw/elabftw","events":[{"introduced":"0"},{"fixed":"6dff2bb12d745cb7b2c35c3617f12d5b68da9018"}]}],"versions":["0.10.0","0.10.1","0.11.0","0.11.0-RC","0.11.0a","0.12.0","0.12.0-BETA","0.12.1","0.12.2","0.12.3","0.12.4","0.12.5","0.7.0","0.7.1","0.7.2","0.7.3","0.7.3.1","0.7.3.2","0.8","0.8.1","0.8.2","0.8.3","0.9.4","0.9.4.2","1.0.0","1.0.0-alpha","1.0.0-beta","1.1.0","1.1.2","1.1.2-p1","1.1.3","1.1.4","1.1.4-p1","1.1.4-p2","1.1.5","1.1.5-beta","1.1.5-p1","1.1.6","1.1.7","1.1.8","1.1.8-p1","1.1.8-p2","1.2.0","1.2.0-alpha","1.2.0-beta","1.2.0-p1","1.2.0-p2","1.2.0-p3","1.2.1","1.2.2","1.2.3","1.2.4","1.3.0","1.5.0","1.5.1","1.5.2","1.5.3","1.5.4","1.5.5","1.5.6","1.5.7","1.6.0","1.6.1","1.6.2","1.7.0","1.7.1","1.7.2","1.7.3","1.7.4","1.7.6","1.7.7","1.7.8","1.8.1","1.8.2","1.8.3","2.0.0","2.0.0-alpha1","2.0.0-alpha2","2.0.0-beta","2.0.1","2.0.2","2.0.3","2.0.4","2.0.5","2.0.6","2.0.7","3.0.0","3.0.0-alpha","3.0.0-beta","3.0.1","3.0.2","3.0.3","3.1.0","3.1.1","3.1.2","3.2.0","3.2.1","3.2.2","3.3.0","3.3.1","3.3.10","3.3.11","3.3.12","3.3.2","3.3.3","3.3.4","3.3.5","3.3.6","3.3.7","3.3.8","3.3.9","3.4.0","3.4.0-alpha","3.4.0-beta","3.4.1","3.4.10","3.4.2","3.4.3","3.4.4","3.4.5","3.4.6","3.4.7","3.4.8","3.4.9","3.5.0","3.5.0-beta","3.5.0-rc","3.5.1","3.5.2","3.5.3","3.5.4","3.6.0","3.6.0-alpha","3.6.0-beta","3.6.0-rc","3.6.1","3.6.2","3.6.3","3.6.4","4.0.0","4.0.0-alpha","4.0.0-alpha2","4.0.0-beta","4.0.0-beta2","4.0.0-beta3","4.0.0-beta4","4.0.0-beta5","4.0.0-beta6","4.0.1","4.0.10","4.0.11","4.0.2","4.0.3","4.0.4","4.0.5","4.0.6","4.0.7","4.0.8","4.0.9","4.1.0","4.1.0-BETA","4.1.0-BETA2","4.1.0-BETA3","4.1.0-BETA4","4.1.0-BETA5","4.1.0-BETA6","4.2.0","4.2.0-BETA","4.2.1","4.2.2","4.3.0","4.3.0-alpha","4.3.0-beta","4.3.0-beta2","4.3.0-beta3","4.3.0-beta4","4.3.0-beta5","4.3.1","4.3.2","4.3.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-31178.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}