What We’re Working On
Issue status
Description
Severity
Completed
DG25-18: Reflected Cross-Site Scripting (XSS) leading to full account takeover
High
Completed
DG25-3: API Tokens of inactive users are not being invalidated
Medium
Completed
DG25-8: Server-Side Template Injection (SSTI)
Medium
Completed
DG25-9: Broken access control - Unauthorised group listing and deletion
Medium
Completed
DG25-15: TOTP brute-forcing due to lack of rate limiting
Medium
Completed
DG25-19: Clickjacking vulnerability
Medium
Completed
DG25-22: OpenID apps do not respect scope
Medium
Completed
DG25-23: OpenID apps remain authorized even after the scope change
Medium
In Progress
DG25-27: [desktop_client] Unrestricted access to the local gRPC service
Medium
Completed
DG25-1: Login enumeration
Low
Completed
DG25-10: Lack of server-side data validation during the enrollment process
Low
Completed
DG25-12: User can bypass only_client_activation feature
Low
Completed
DG25-13: User can see configuration even when this option is not visible in GUI
Low
Completed
DG25-14: Plain-text passwords stored in logs
Low
Completed
DG25-16: HTML Injection - password reset
Low
Completed
DG25-17: Open redirect
Low
Completed
DG25-20: Disabled OpenID apps still generate code
Low
Completed
DG25-25: Access token is not being revoked when OpenID app becomes disabled
Low
Completed
DG25-28: [desktop_client] Wide file permissions
Low
Completed
DG25-32: Logs contains license key
Low
Completed
DG25-11: Improper handling of user-provided input leads to panic
Info
Completed
DG25-21: HTML Injection - OpenID login
Info
Completed
DG25-24: RFC 6749 violation - code can be used more than once due to race condition
Info
Completed
DG25-29: [desktop_client] WireGuard configuration in the Defugard service logs
Info
Completed
DG25-31: Some users might be blocked from accessing defguard via OpenID
Info