Team API Missing Object-Level Authorization

Affected versions

  • Affected versions: < 2.54.0
  • Patched version: 2.54.0
  • Advisory published: 21 Apr 2026

Severity

Severity: Low

The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2026-41498 to this issue.

Vulnerability

The Team API endpoints use #[IsGranted('edit_team')] instead of #[IsGranted('edit', 'team')], causing Symfony TeamVoter to abstain from voting. This removes entity-level ownership checks on team operations, allowing any user with the edit_team permission to modify any team, not just teams they are authorized to manage.

Info

The team association endpoints in src/API/TeamController.php use #[IsGranted('edit_team')] with a single argument. The controller at src/Controller/TeamController.php correctly uses #[IsGranted('edit', 'team')] with two arguments, passing the $team parameter as the subject. When edit_team is passed as the attribute, TeamVoter::supportsAttribute() returns false because it only recognizes view, edit, and delete. The voter abstains entirely. Only RolePermissionVoter fires, which checks the role-level permission without any entity-level ownership validation.

In default configuration, only ROLE_ADMIN and ROLE_SUPER_ADMIN have edit_team, making the missing check less critical. The vulnerability becomes exploitable if an administrator grants edit_team to a lower-privilege role (such as ROLE_TEAMLEAD) through the permissions UI. In that scenario, the lower-privilege user could modify any team’s membership, customer assignments, project assignments, and activity assignments without being a member or teamlead of that team.

Solution

Users should update to 2.54.0 or newer.

Credits

  • Reported by: AzureADTrent
  • Patched by: kevinpapst

First reported in GitHub advisory: GHSA-jv9x-w4gm-hwcm

Top