Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
WS-2019-0363
Published:May 14, 2026
Updated:May 14, 2026
Leaking cached authenticated requests Impact If you've been using one "MemoryCacheMethod" object in multiple instances of "Gw2WebApiClient" and are requesting authenticated endpoints with different access tokens, then you are likely to run into this bug. When using an instance of "MemoryCacheMethod" and using it with multiple instances of "Gw2WebApiClient", there's a possibility that cached authenticated responses are leaking to another request to the same endpoint, but with a different Guild Wars 2 access token. The latter request wouldn't start however, and would return the first cached response immediately. This means that the second response (or later responses) may contain the same data as the first response, therefore leaking data from another authenticated endpoint. The occurence of this is limited however. The Guild Wars 2 API doesn't use the "Expires" header on most (if not all) authenticated endpoints. This header is checked when caching responses. If this header isn't available, the response isn't cached at all. You should still update to at least version 0.3.1 in order to be certain that it won't happen. Patches This bug has been fixed in version 0.3.1. When using an authenticated endpoint, it will prepend the SHA-1 hash of the access token to the cache id. Workarounds For version 0.3.0 and lower, you can use one separate instance of "MemoryCacheMethod" per "Gw2WebApiClient" if you need to use it. For more information If you have any questions or comments about this advisory, you can open an issue in "the Gw2Sharp repository" (https://github.com/Archomeda/Gw2Sharp) or contact me on "Discord" (https://discord.gg/hNcpDT3).
Do you need more information?
Contact Us
CVSS v4
Base Score:
7.1
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE