Vuln ID TP-024 Title BOPLA - Excessive Data Exposure on Order Details Severity high Type Data Exposure HTTP Method GET URL /orders/:id Parameter id Filename - Code Location backend/api/models/Order.php lines 99-101

Description

The order detail endpoint JOINs with users table and returns password_hash, totp_secret, and is_admin flag in the response.

Proof of Concept

GET /orders/1 — response includes owner_password_hash, owner_totp_secret.

Remediation

Only SELECT fields needed for display (name, email). Never expose password_hash or totp_secret.