Overview
The CVE-2025-51869 is an Insecure Direct Object Reference (IDOR) vulnerability present in Liner, a popular note-taking and web highlighting app. This vulnerability could allow unauthorized access to sensitive information via specially crafted parameters. It’s an alarming issue as it could lead to potential system compromise or data leakage, impacting the confidentiality and integrity of the system.
Vulnerability Summary
CVE ID: CVE-2025-51869
Severity: High (CVSS: 7.5)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Unauthorized access to sensitive information, potential system compromise, data leakage.
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Liner | Up to 2025-06-03
How the Exploit Works
The vulnerability exists due to insecure direct object references in the application’s space_id, thread_id, and message_id parameters to the v1/space/{space_id}/thread/{thread_id}/message/{message_id} endpoint. A remote attacker can send a specially crafted request with manipulated parameters to the application, allowing them to access data that they are not authorized to view or interact with.
Conceptual Example Code
The following is a conceptual example of how the vulnerability might be exploited. This is a sample HTTP request where an attacker manipulates the space_id, thread_id, and message_id parameters.
GET /v1/space/ABC/thread/DEF/message/GHI HTTP/1.1
Host: target.example.com
Content-Type: application/json
{ "space_id": "XYZ", "thread_id": "123", "message_id": "456" }
In this example, the attacker replaces the space_id, thread_id, and message_id parameters with unauthorized values, thus gaining access to sensitive information they should not have access to.

