Users can change project visibility which requires high subscription by just changing request body
Medium
Vulnerability Details
## Summary:
A Broken Access Control vulnerability allows users to change project visibility — a feature restricted to higher subscription tiers — by simply modifying the request body of visibility to Personal or Workspace. This bypasses subscription checks, enabling unauthorized access to premium functionality
## Steps To Reproduce:
1. On the burp, enable intercept
2. On Lovabl, write anything to build a project
3. Click create and go to burp to endpoint `https://lovable-api.com/workspaces/{YOUR-WORKSPACE-ID}/projects`
4. On the body of the request change the visibility to Personal or Workspace which requires paid subscription
```
{"description":"landing view","visibility":"Personal","initial_message":{"id":"umsg_01k6qkw83ze07t9f7m9p3jabs9","message":"landing view","files":[],"optimisticImageUrls":[],"chat_only":false,"agent_mode_enabled":false,"ai_message_id":"aimsg_01k6qkw841e07t9f7ytpghd6bs"}}
```
5. Send the request, 201 Created response and the project is now personal or workspace without any restrictions
{F4856401}
## POC Video
{F4856412}
## Impact
- Users can access resources, features, or content they did not pay for
- Direct revenue loss to the company since attackers can use premium features without subscription/payment.
Actions
View on HackerOneReport Stats
- Report ID: 3370430
- State: Closed
- Substate: resolved
- Upvotes: 4