Authorization Bypass Through User-Controlled Key vulnerability in Scott Taylor Avatar allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Avatar: from n/a through 0.1.4.
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.