TSU-01 highlights the risks that arise when permissions in Mendix are set too broadly. When users are granted excessive rights, they may gain access to functions or data not intended for them, which can potentially lead to data leaks. A secure configuration starts with limiting permissions to what is strictly necessary, avoiding overlapping roles, and carefully assigning module roles. By consistently applying these principles, you maintain control over user access and significantly reduce the risk of misuse.
Mendix uses Role Based Access Control (RBAC) to determine which actions a user is allowed to perform. Each user has one or more User Roles linked to specific module roles and, in some cases, supplemented with rights for user management. When these roles are misconfigured, users may gain more access than intended, leading to issues such as unauthorized data access or even data leaks.
TSU-01 and TSU-02 are often confused. Both deal with users having too much access, but understanding the difference helps you prevent risks more effectively.
Limit user privileges to what’s strictly necessary. This helps you stay in control of your application and prevent TSU-01 vulnerabilities. Use the following best practices as your guide.
Watch out for these common configuration mistakes to prevent users from gaining more access than intended.
Want to know how your Mendix application scores on The S-Unit Top 10? In collaboration with Omnext, we’ve developed a Mendix-specific SAST solution that continuously and automatically scans for vulnerabilities. By integrating The S-Unit Top 10 into the CI/CD pipeline, risks are detected early and made immediately visible. For questions, feel free to contact us.