Goal Reached Thanks to every supporter โ€” we hit 100%!

Goal: 1000 CNY ยท Raised: 1000 CNY

100.0%

CVE-2026-29789 โ€” AI Deep Analysis Summary

CVSS 10.0 ยท Critical

Q1What is this vulnerability? (Essence + Consequences)

๐Ÿšจ **Essence**: Missing Authorization Check in Workflow Site Creation. <br>๐Ÿ’ฅ **Consequences**: Attackers can create/manage sites on servers belonging to *other* projects. Total loss of isolation between projects.

Q2Root Cause? (CWE/Flaw)

๐Ÿ›ก๏ธ **Root Cause**: CWE-862 (Missing Authorization). <br>๐Ÿ” **Flaw**: The system fails to verify if the user owns the target `server_id` when creating a site via workflow. It trusts the input blindly.

Q3Who is affected? (Versions/Components)

๐Ÿ“ฆ **Affected**: Vito (VitoDeploy). <br>๐Ÿ“‰ **Versions**: All versions **before 3.20.3**. <br>๐Ÿ”ง **Component**: Server management & PHP app deployment web interface.

Q4What can hackers do? (Privileges/Data)

๐Ÿ‘ฎ **Privileges**: Escalates from 'Project Workflow Writer' to 'Cross-Project Server Admin'. <br>๐Ÿ“‚ **Data**: Can deploy code, modify configs, and potentially access data on servers not owned by the attacker's project.

Q5Is exploitation threshold high? (Auth/Config)

โš ๏ธ **Threshold**: Medium. <br>๐Ÿ”‘ **Auth**: Requires **Valid Login** (PR:L). <br>๐ŸŽฏ **Config**: Needs 'Write' permission on a workflow in *any* project. No UI interaction needed (UI:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

๐Ÿšซ **Public Exp**: No PoC provided in data. <br>๐ŸŒ **Wild Exp**: Low risk currently. <br>๐Ÿ“ **Note**: CVSS S:C (Changed Scope) implies high impact, but exploitation requires specific internal knowledge of server IDs.

Q7How to self-check? (Features/Scanning)

๐Ÿ” **Self-Check**: <br>1. Check Vito version. <br>2. Audit users with 'Workflow Write' access. <br>3. Monitor logs for site creation requests with `server_id` not matching the project's servers.

Q8Is it fixed officially? (Patch/Mitigation)

โœ… **Fixed**: Yes! <br>๐Ÿ“… **Patch**: Version **3.20.3**. <br>๐Ÿ”— **Source**: GitHub Release & Security Advisory (GHSA-3m6w-8qh4-qr76).

Q9What if no patch? (Workaround)

๐Ÿ›ก๏ธ **Workaround**: <br>1. **Upgrade** to v3.20.3+ immediately. <br>2. If stuck: Restrict 'Workflow Write' permissions to admins only. <br>3. Implement WAF rules to validate `server_id` against project ownership.

Q10Is it urgent? (Priority Suggestion)

๐Ÿ”ฅ **Urgency**: HIGH. <br>๐Ÿ“Š **Priority**: P1. <br>๐Ÿ’ก **Why**: CVSS 9.1 (Critical). Scope Change (S:C) means one breach affects multiple projects. Patch immediately to prevent lateral movement.