Abusing GraphQL IDOR to Delete Another User's Profile Picture

This vulnerability stems from a subtle but critical flaw in the platform’s GraphQL implementation. The backend allowed profile pictures to be referenced via a shared profile_picture_id — but failed to enforce strict ownership validation when that ID was mutated via profile updates.

The exploit took advantage of how GraphQL resolvers returned deeply nested user data (including profile picture metadata) to unauthorized users within the same class/group context. By chaining this exposure with a mutation that reused the ID, the attacker could overwrite and delete a victim's profile picture — all through legitimate UI actions, amplified by crafted GraphQL queries.

Context: GraphQL and Shared Media Objects

Unlike REST APIs, GraphQL often returns large, nested response objects. In this case, a query like getClassMembers exposed each user's profilePictureUrl, from which the profile_picture_id could be extracted by parsing the URL. This ID wasn't scoped per user, and the backend didn’t verify that the current user had ownership of the referenced media object when reusing it in a mutation.

Steps to Reproduce

  • Create two accounts:
    • User A (victim)
    • User B (attacker)
  • User A creates a “Class” and adds User B to it — establishing access context for viewing user details via GraphQL.
  • User B performs a query like:
    query {{
      classMembers(classId: "xyz") {{
        id
        name
        profilePictureUrl
      }}
    }}
    
  • The returned profilePictureUrl contains a UUID — e.g.,
    https://cdn.example.com/images/cb227e3c-4bb3-42fc-8c29-b3030d6e86ab/avatar.png
    This UUID is the profile_picture_id used internally.
  • User B now uses a GraphQL mutation to update their own profile and sets:
    mutation {{
      updateProfile(input: {{
        profile_picture_id: "cb227e3c-4bb3-42fc-8c29-b3030d6e86ab"
      }}) {{
        success
      }}
    }}
    
    This effectively links both profiles to the same image.
  • To delete the image, the attacker either sends:
    mutation {{
      updateProfile(input: {{
        profile_picture_id: null
      }}) {{
        success
      }}
    }}
    
    Or performs a delete mutation if supported by the schema. Since the object is shared, it is removed globally — affecting the victim as well.
  • Timeline