Summary
The categories.json.php endpoint, which serves the category listing API, fails to enforce user group-based access controls on categories. In the default request path (no ?user= parameter), user group filtering is entirely skipped, exposing all non-private categories including those restricted to specific user groups. When the ?user= parameter is supplied, a type confusion bug causes the filter to use the admin user's (user_id=1) group memberships instead of the current user's, rendering the filter ineffective.
Details
The vulnerability has two related failures in objects/categories.json.php and objects/category.php:
1. Default request — group filtering completely skipped
In categories.json.php:17-24, when $_GET['user'] is not set, $sameUserGroupAsMe defaults to false:
// categories.json.php:17-24
$onlyWithVideos = false;
$sameUserGroupAsMe = false;
if(!empty($_GET['user'])){
$onlyWithVideos = true;
$sameUserGroupAsMe = true;
}
$categories = Category::getAllCategories(true, $onlyWithVideos, false, $sameUserGroupAsMe);
In category.php:438-452, the user group filter is gated on $sameUserGroupAsMe being truthy:
// category.php:438-452
if ($sameUserGroupAsMe) {
$users_groups = UserGroups::getUserGroups($sameUserGroupAsMe);
$users_groups_id = array(0);
foreach ($users_groups as $value) {
$users_groups_id[] = $value['id'];
}
$sql .= " AND ("
. "(SELECT count(*) FROM categories_has_users_groups chug WHERE c.id = chug.categories_id) = 0 OR "
. "(SELECT count(*) FROM categories_has_users_groups chug2 WHERE c.id = chug2.categories_id AND users_groups_id IN (" . implode(',', $users_groups_id) . ")) >= 1 "
. ")";
}
Since $sameUserGroupAsMe = false, the entire block is skipped. All non-private categories are returned regardless of their user group restrictions set via the categories_has_users_groups table.
2. With ?user= parameter — boolean-to-integer type confusion
When $_GET['user'] is non-empty, $sameUserGroupAsMe is set to boolean true (line 21). This value is passed to UserGroups::getUserGroups($sameUserGroupAsMe) at category.php:440.
In userGroups.php:349-379, the parameter is used as $users_id:
// userGroups.php:349,371,379
public static function getUserGroups($users_id){
// ...
$sql = "SELECT uug.*, ug.* FROM users_groups ug"
. " LEFT JOIN users_has_users_groups uug ON users_groups_id = ug.id WHERE users_id = ? ";
// ...
$res = sqlDAL::readSql($sql, "i", [$users_id]);
PHP casts boolean true to integer 1 for the prepared statement bind, resulting in WHERE users_id = 1 — fetching the admin user's group memberships. The filter then allows categories visible to admin groups, effectively granting any unauthenticated user the admin's category visibility.
3. getTotalCategories also unfiltered
getTotalCategories() at category.php:978 does not accept a $sameUserGroupAsMe parameter at all, so the total count always reflects the unfiltered category set.
The endpoint requires no authentication — it uses allowOrigin() (a CORS header helper) and is publicly routable via the .htaccess rewrite rule: RewriteRule ^categories.json$ objects/categories.json.php.
PoC
# 1. Fetch all categories without authentication — no group filtering applied
curl -s 'https://target/categories.json' | jq '.rows[] | {id, name, private, users_groups_ids_array}'
# Returns ALL non-private categories including those restricted to specific user groups.
# The users_groups_ids_array field reveals which groups each category is restricted to.
# Categories with non-empty users_groups_ids_array should be hidden from users not in those groups.
# 2. Attempt the "filtered" path — still broken due to boolean->int cast
curl -s 'https://target/categories.json?user=1' | jq '.rows[] | {id, name, private, users_groups_ids_array}'
# This applies group filtering but uses admin's groups (users_id=1) instead of the
# current user's groups, so group-restricted categories visible to admin are exposed.
Impact
Any unauthenticated user can:
- Enumerate all non-private categories regardless of user group restrictions, bypassing the intended access control model where categories are restricted to specific user groups via the CustomizeUser plugin's
categories_has_users_groups table.
- Discover the user group configuration for each category via the
users_groups_ids_array field in the response, revealing the internal access control structure.
- Identify group-restricted content areas that should be hidden, which could be used to target further access control bypasses on the videos within those categories.
The severity is Medium because this is an information disclosure of category metadata (names, descriptions, icons, group assignments) rather than the actual video content within restricted categories. However, the exposure of the access control structure itself (which groups have access to which categories) is a meaningful information leak.
Recommended Fix
In objects/categories.json.php, pass the current user's ID (or 0 for unauthenticated users) instead of a boolean:
// categories.json.php — replace lines 17-24
$onlyWithVideos = false;
$sameUserGroupAsMe = false;
if(!empty($_GET['user'])){
$onlyWithVideos = true;
}
// Always apply user group filtering using the logged-in user's ID
$currentUserId = User::getId();
if (!empty($currentUserId)) {
$sameUserGroupAsMe = $currentUserId;
} else {
// For unauthenticated users, pass a value that will filter to only
// categories with no group restrictions
$sameUserGroupAsMe = -1; // Non-existent user ID, will match no groups
}
$categories = Category::getAllCategories(true, $onlyWithVideos, false, $sameUserGroupAsMe);
Additionally, in category.php:getAllCategories(), ensure the group filter block always runs when categories have group restrictions, not only when $sameUserGroupAsMe is truthy. A more robust approach:
// category.php — replace the sameUserGroupAsMe block (lines 438-452)
// Always filter by user groups if any categories have group restrictions
$users_groups_id = array(0);
if ($sameUserGroupAsMe && $sameUserGroupAsMe > 0) {
$users_groups = UserGroups::getUserGroups($sameUserGroupAsMe);
foreach ($users_groups as $value) {
$users_groups_id[] = $value['id'];
}
}
$sql .= " AND ("
. "(SELECT count(*) FROM categories_has_users_groups chug WHERE c.id = chug.categories_id) = 0 OR "
. "(SELECT count(*) FROM categories_has_users_groups chug2 WHERE c.id = chug2.categories_id AND users_groups_id IN (" . implode(',', $users_groups_id) . ")) >= 1 "
. ")";
This ensures that even when no user is logged in, categories with group restrictions are hidden (only categories with zero group restrictions are shown). The getTotalCategories() function should also be updated to accept and apply the same $sameUserGroupAsMe filter.
Summary
The
categories.json.phpendpoint, which serves the category listing API, fails to enforce user group-based access controls on categories. In the default request path (no?user=parameter), user group filtering is entirely skipped, exposing all non-private categories including those restricted to specific user groups. When the?user=parameter is supplied, a type confusion bug causes the filter to use the admin user's (user_id=1) group memberships instead of the current user's, rendering the filter ineffective.Details
The vulnerability has two related failures in
objects/categories.json.phpandobjects/category.php:1. Default request — group filtering completely skipped
In
categories.json.php:17-24, when$_GET['user']is not set,$sameUserGroupAsMedefaults tofalse:In
category.php:438-452, the user group filter is gated on$sameUserGroupAsMebeing truthy:Since
$sameUserGroupAsMe = false, the entire block is skipped. All non-private categories are returned regardless of their user group restrictions set via thecategories_has_users_groupstable.2. With
?user=parameter — boolean-to-integer type confusionWhen
$_GET['user']is non-empty,$sameUserGroupAsMeis set to booleantrue(line 21). This value is passed toUserGroups::getUserGroups($sameUserGroupAsMe)atcategory.php:440.In
userGroups.php:349-379, the parameter is used as$users_id:PHP casts boolean
trueto integer1for the prepared statement bind, resulting inWHERE users_id = 1— fetching the admin user's group memberships. The filter then allows categories visible to admin groups, effectively granting any unauthenticated user the admin's category visibility.3. getTotalCategories also unfiltered
getTotalCategories()atcategory.php:978does not accept a$sameUserGroupAsMeparameter at all, so the total count always reflects the unfiltered category set.The endpoint requires no authentication — it uses
allowOrigin()(a CORS header helper) and is publicly routable via the.htaccessrewrite rule:RewriteRule ^categories.json$ objects/categories.json.php.PoC
Impact
Any unauthenticated user can:
categories_has_users_groupstable.users_groups_ids_arrayfield in the response, revealing the internal access control structure.The severity is Medium because this is an information disclosure of category metadata (names, descriptions, icons, group assignments) rather than the actual video content within restricted categories. However, the exposure of the access control structure itself (which groups have access to which categories) is a meaningful information leak.
Recommended Fix
In
objects/categories.json.php, pass the current user's ID (or 0 for unauthenticated users) instead of a boolean:Additionally, in
category.php:getAllCategories(), ensure the group filter block always runs when categories have group restrictions, not only when$sameUserGroupAsMeis truthy. A more robust approach:This ensures that even when no user is logged in, categories with group restrictions are hidden (only categories with zero group restrictions are shown). The
getTotalCategories()function should also be updated to accept and apply the same$sameUserGroupAsMefilter.