How I Discovered Authentication Bypass That Blocks Users from Accessing the Website ?

Mohamed Sayed
3 min readJul 3, 2024


Hi amazing hackers ,

Today we gonna talk about authentication bypass vulnerability that i found in a public bug bounty program .

Let’s start our story

I started hunting on the program and I spent about 3 days to understand it.

The program allows you to create an organization and invite users with different roles

now the organization contains :

Owner → User 1

Admin → User 2

Member → User 3

There is an option for the owner to create a new role so he created a new role called “Test” and gave it to user 3

User 2 (Admin) also can reach the role section but he cannot delete the roles .

So first thing came to my mind , what if i tried to delete the new role that the Owner gave to User 3 ??

Lets try ..

I went to the role section with User 2 and pressed on the new role and sent the request to repeater

So i tried to delete the role by replacing the GET with DELETE

but i couldn’t , because the system doesn’t allow to delete a role if a user still have it ..

I spent a lot of time trying to delete it , but i failed .

I saw in the response that the system allow using some different methods in the request

So I said what if i tried to send different method then use DELETE again??

lets try…

I tried all the methods but it didn’t work with me .

But , When I sent PATCH in the request i got information about the role in the response .

So lets try to delete it after the PATCH request.

lets use DELETE again and send the request ….


I got ( 204 no content ) response and the role has been deleted…

Now lets see what happened to User 3 when i deleted his role ..

I went to user 3 account and refreshed the page and guess what ??

He can’t even access the website or anything again , he will get error page every time he tries to access the website


27 Jun 2024reported

2 July 2024 → awarded $$$

Follow me on:

twitter / linkedin