### [CVE-2017-7650](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7650) ![](https://img.shields.io/static/v1?label=Product&message=Mosquitto&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=loss%20of%20confidentiality&color=brighgreen) ### Description In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto. ### POC #### Reference - https://bugs.eclipse.org/bugs/show_bug.cgi?id=516765 #### Github No PoCs found on GitHub currently.