Ameeba Exploit Tracker

Tracking CVEs, exploits, and zero-days for defensive cybersecurity research.

Ameeba Blog Search
TRENDING · 1 WEEK
Attack Vector
Vendor
Severity

CVE-2025-51869: Insecure Direct Object Reference Vulnerability in Liner

Ameeba Chat Store screens
Download Ameeba Chat

Overview

The CVE-2025-51869 is an Insecure Direct Object Reference (IDOR) vulnerability present in Liner, a popular note-taking and web highlighting app. This vulnerability could allow unauthorized access to sensitive information via specially crafted parameters. It’s an alarming issue as it could lead to potential system compromise or data leakage, impacting the confidentiality and integrity of the system.

Vulnerability Summary

CVE ID: CVE-2025-51869
Severity: High (CVSS: 7.5)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Unauthorized access to sensitive information, potential system compromise, data leakage.

Affected Products

Ameeba Chat Icon Escape the Surveillance Era

Most apps won’t tell you the truth.
They’re part of the problem.

Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.

Ameeba Chat gives you a way out.

  • • No phone number
  • • No email
  • • No personal info
  • • Anonymous aliases
  • • End-to-end encrypted

Chat without a trace.

Product | Affected Versions

Liner | Up to 2025-06-03

How the Exploit Works

The vulnerability exists due to insecure direct object references in the application’s space_id, thread_id, and message_id parameters to the v1/space/{space_id}/thread/{thread_id}/message/{message_id} endpoint. A remote attacker can send a specially crafted request with manipulated parameters to the application, allowing them to access data that they are not authorized to view or interact with.

Conceptual Example Code

The following is a conceptual example of how the vulnerability might be exploited. This is a sample HTTP request where an attacker manipulates the space_id, thread_id, and message_id parameters.

GET /v1/space/ABC/thread/DEF/message/GHI HTTP/1.1
Host: target.example.com
Content-Type: application/json
{ "space_id": "XYZ", "thread_id": "123", "message_id": "456" }

In this example, the attacker replaces the space_id, thread_id, and message_id parameters with unauthorized values, thus gaining access to sensitive information they should not have access to.

Want to discuss this further? Join the Ameeba Cybersecurity Group Chat.

Disclaimer:

The information and code presented in this article are provided for educational and defensive cybersecurity purposes only. Any conceptual or pseudocode examples are simplified representations intended to raise awareness and promote secure development and system configuration practices.

Do not use this information to attempt unauthorized access or exploit vulnerabilities on systems that you do not own or have explicit permission to test.

Ameeba and its authors do not endorse or condone malicious behavior and are not responsible for misuse of the content. Always follow ethical hacking guidelines, responsible disclosure practices, and local laws.
Ameeba Chat