<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Idor on kalfaoglu.net</title><link>https://blog.kalfaoglu.net/tags/idor/</link><description>Recent content in Idor on kalfaoglu.net</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 17 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.kalfaoglu.net/tags/idor/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-29204: WHMCS's IDOR Bug Scores a Perfect 10 — Patch Before Your Customers Notice</title><link>https://blog.kalfaoglu.net/posts/2026-05-17-whmcs-cve-2026-29204-idor-en/</link><pubDate>Sun, 17 May 2026 00:00:00 +0000</pubDate><guid>https://blog.kalfaoglu.net/posts/2026-05-17-whmcs-cve-2026-29204-idor-en/</guid><description>&lt;p&gt;If you run WHMCS and haven&amp;rsquo;t updated in the past week, stop reading and go do that first. Back? Good. Here&amp;rsquo;s what you just patched.&lt;/p&gt;
&lt;h2 id="what-the-vulnerability-is"&gt;What the Vulnerability Is&lt;/h2&gt;
&lt;p&gt;On 12 May 2026, WHMCS published &lt;a href="https://help.whmcs.com/m/125386/l/2073908-cve-2026-29204"&gt;CVE-2026-29204&lt;/a&gt; — an authorization bypass rooted in &lt;code&gt;clientarea.php&lt;/code&gt;. The flaw is textbook IDOR (Insecure Direct Object Reference, classified as &lt;a href="http://cwe.mitre.org/data/definitions/639.html"&gt;CWE-639&lt;/a&gt;): when a client area user submits a request that includes an &lt;code&gt;addonId&lt;/code&gt; parameter, WHMCS fails to verify whether that addon actually belongs to the requesting account. Swap in a different user&amp;rsquo;s &lt;code&gt;addonId&lt;/code&gt;, and you walk straight into their services.&lt;/p&gt;</description></item></channel></rss>