Home

Description

Heym before 0.0.21 contains an authorization bypass vulnerability in workflow execution that allows authenticated users to execute arbitrary workflows by referencing victim workflow UUIDs without proper access validation. Attackers can create workflows with execute nodes or agent subWorkflowIds pointing to victim workflow UUIDs to load and execute those workflows under attacker-controlled execution paths, exposing victim workflow outputs and triggering workflow nodes with unintended side effects.

PUBLISHED Reserved 2026-05-11 | Published 2026-05-12 | Updated 2026-05-13 | Assigner VulnCheck




HIGH: 7.6CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

HIGH: 7.1CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L

Problem types

Incorrect Authorization

Product status

Default status
affected

Any version before 0.0.21
affected

3ae3ef6a7d3609da0e910f9ed6b81e99a1661ac8 (git)
unaffected

Credits

Chia Min Jun Lennon finder

References

github.com/heymrun/heym/releases/tag/v0.0.21 release-notes

github.com/heymrun/heym/pull/93 issue-tracking

github.com/...ommit/3ae3ef6a7d3609da0e910f9ed6b81e99a1661ac8 patch

www.vulncheck.com/...horization-bypass-in-workflow-execution third-party-advisory

cve.org (CVE-2026-45226)

nvd.nist.gov (CVE-2026-45226)

Download JSON