CVE-2025-65017

The GDPR Paradox: How Decidim's Privacy Export Leaked Everyone's Data

Alon Barad
Alon Barad
Software Engineer

Feb 3, 2026·5 min read·5 visits

Executive Summary (TL;DR)

Decidim used UUIDs for private exports, but the database column expected Integers. Ruby cast the UUIDs (e.g., 'a1b2...') to '0', causing different users' files to overwrite each other or be served interchangeably. Attackers could simply request their own data and receive someone else's sensitive ZIP file.

A critical type confusion vulnerability in Decidim's 'Download Your Data' feature turned a privacy compliance tool into a data leak hose. Due to a mismatch between Ruby on Rails' ActiveStorage schema and Decidim's use of UUIDs, unique export IDs were silently cast to integers, causing massive database collisions. This allowed users requesting their own data to accidentally download full data dumps belonging to other users.

The Hook: Privacy as an Attack Vector

Irony is the lifeblood of the security industry, and CVE-2025-65017 is a vintage bottle of it. Decidim, a platform designed for participatory democracy and citizen engagement, naturally has a 'Download Your Data' feature. It's a GDPR requirement, designed to give users control and transparency over their private information.

But in software engineering, the road to hell is paved with type mismatches. In versions 0.30.0 through 0.31.0, this exact feature—the one explicitly built to protect user agency—became a mechanism for unauthenticated (or low-privilege) mass data disclosure. The bug wasn't a complex buffer overflow or a sophisticated injection. It was a simple case of the database speaking one language (Integers) and the application speaking another (UUIDs), with the translator (Ruby) doing a terrible job in the middle.

Imagine walking into a coat check, handing them ticket 'A123', and the attendant ripping off the 'A', seeing '0', and handing you the coat belonging to the guy with ticket 'B456' (which also became '0'). That is effectively what happened here, but instead of coats, it was ZIP files containing voting history, private messages, and user metadata.

The Flaw: A fatal Case of Type Casting

The root cause is a classic mismatch in the Active Record ecosystem. When Decidim introduced the PrivateExport model, they correctly decided to use UUIDs for primary keys. UUIDs are great; they are unguessable and prevent enumeration attacks. However, they attached files to this model using Rails' ActiveStorage.

Here lies the trap: By default, the active_storage_attachments table defines its record_id column as a bigint. It expects a number. When you try to save an attachment associated with a record that has a UUID string for an ID, the system has to make a choice. Instead of throwing an error, the database adapter (or Ruby itself, depending on the layer) attempts a cast.

In Ruby, string-to-integer casting is notoriously permissive. It parses until it hits a non-numeric character.

  • UUID 0210ae70... becomes Integer 210.
  • UUID e9540f96... (starting with a letter) becomes Integer 0.

Since UUIDs are hexadecimal, a significant portion of all generated IDs begin with a letter (a through f). Every single one of those exports was saved into the database with a record_id of 0. The entropy of a 128-bit UUID was instantly crushed into a single digit.

The Code: The Smoking Gun

Let's look at the implementation that caused this collision. The developers defined the model to use the UUID, but failed to update the underlying storage association to handle it.

The Vulnerable Model:

# app/models/decidim/private_export.rb
class PrivateExport < ApplicationRecord
  # This implies id is a UUID string
  include Decidim::HasUploadValidations
  
  # The retrieval logic
  def self.retrieve(user)
    # Finds the record by UUID, but the attachment is linked by INT
    user.private_exports.order(created_at: :desc).first
  end
end

The Invisible Failure:

When ActiveStorage saves the attachment, it executes SQL similar to this:

INSERT INTO active_storage_attachments (record_id, record_type, ...) 
VALUES ('e9540f...', 'Decidim::PrivateExport', ...);

Because the column record_id is bigint, Postgres (or the driver) casts 'e9540f...' to 0.

The Dangerous Retrieval:

When a user clicks download, the controller looks up the export. Even if the controller finds the correct PrivateExport record (with UUID e9540f...), when it asks for the file, ActiveStorage queries:

SELECT * FROM active_storage_attachments 
WHERE record_id = 0 -- collision!
AND record_type = 'Decidim::PrivateExport';

If 50 users have exports starting with a letter, they all share ID 0. The database returns the first one it finds. You just downloaded someone else's life.

The Exploit: Passive Roulette

Exploiting this requires zero technical skill, just patience and a registered account. It is a game of "Data Roulette."

Step 1: The Setup An attacker creates an account on the target Decidim instance. They navigate to the "Download Your Data" section and request an export.

Step 2: The Trigger The system generates a UUID for the export. The attacker doesn't control this UUID, but probability is on their side. There is a ~37.5% chance the UUID starts with a letter (a-f), causing it to map to ID 0.

Step 3: The Collection The attacker polls the download endpoint. If their export mapped to 0, and a victim also requested an export that mapped to 0, the database now holds multiple attachments for ID 0.

Depending on the database sort order (usually insertion order or primary key), the attacker's request might serve up the most recent file added to ID 0. If the victim requested their export after the attacker, the attacker's subsequent download attempts could fetch the victim's ZIP file.

No SQL injection, no XSS. Just bad schema design and a download button.

The Fix: Nuke It From Orbit

The remediation for CVE-2025-65017 was drastic but necessary. You cannot simply "un-mix" the data. Once multiple files are associated with ID 0, there is no reliable way to know which file belongs to which UUID. The metadata linkage is severed.

1. Schema Change: The patch involved a migration to change the PrivateExport primary key back to a standard auto-incrementing Integer (id) to satisfy ActiveStorage, while moving the UUID to a dedicated, separate column (uuid) for public-facing lookups.

2. The Purge: The most painful part of the fix was the cleanup. A rake task (decidim:upgrade:clean:remove_private_exports_attachments) was released to physically delete all existing private export attachments. It was the only safe move: treat all cached data as compromised.

3. Scoped Lookup: The controller logic was tightened to ensure that even if a collision theoretically happened, the query is strictly scoped to the current_user's association, though the schema change fundamentally solves the root cause.

Fix Analysis (1)

Technical Appendix

CVSS Score
8.2/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
EPSS Probability
0.04%
Top 100% most exploited

Affected Systems

Decidim Framework

Affected Versions Detail

Product
Affected Versions
Fixed Version
Decidim
Decidim
>= 0.30.0 < 0.30.40.30.4
Decidim
Decidim
>= 0.31.0.rc1 < 0.31.00.31.0
AttributeDetail
CWE IDCWE-200 (Info Disclosure)
CWE IDCWE-703 (Improper Check of Unusual Conditions)
CVSS v4.08.2 (High)
Attack VectorNetwork
PrivilegesLow (Any User)
ImpactConfidentiality Loss (Total for affected scope)
CWE-704
Incorrect Type Conversion or Cast

The application implicitly casts distinct UUID strings to identical integers (often 0), causing object reference collisions.

Vulnerability Timeline

Issue first identified internally
2025-10-29
Patch committed to repository
2025-11-13
CVE-2025-65017 Published
2026-02-03

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.