An issue was discovered in getrebuild/rebuild 4.0.4. The affected source code class is com.rebuild.web.RebuildWebInterceptor, and the affected function is preHandle In the filter code, use CodecUtils.urlDecode(request.getRequestURI()) to obtain the URL-decoded request path, and then determine whether the path endsWith /error. If so, execute return true to skip this Interceptor. Else, redirect to /user/login api. Allowing unauthenticated attackers to gain sensitive information or escalated privileges.
References
| Link | Resource |
|---|---|
| https://racerz.notion.site/Rebuild-Vulnerability-1ede0e0074f280d8a906c38442a393f0 | Exploit Third Party Advisory |
| https://www.notion.so/racerz/Rebuild-Vulnerability-1ede0e0074f280d8a906c38442a393f0?pvs=4 | Exploit Third Party Advisory |
Configurations
History
09 Oct 2025, 17:54
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Getrebuild rebuild
Getrebuild |
|
| References | () https://racerz.notion.site/Rebuild-Vulnerability-1ede0e0074f280d8a906c38442a393f0 - Exploit, Third Party Advisory | |
| References | () https://www.notion.so/racerz/Rebuild-Vulnerability-1ede0e0074f280d8a906c38442a393f0?pvs=4 - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:getrebuild:rebuild:*:*:*:*:*:*:*:* |
26 Aug 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CWE | CWE-284 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
25 Aug 2025, 20:24
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-25 15:15
Updated : 2025-10-09 17:54
NVD link : CVE-2025-50900
Mitre link : CVE-2025-50900
CVE.ORG link : CVE-2025-50900
JSON object : View
Products Affected
getrebuild
- rebuild
CWE
CWE-284
Improper Access Control
