Description
Docmost is an open-source collaborative wiki and documentation software. From 0.21.0 to before 0.24.0, Docmost is vulnerable to Arbitrary File Write via Zip Import Feature (ZipSlip). In apps/server/src/integrations/import/utils/file.utils.ts, there are no validation on filename. This vulnerability is fixed in 0.24.0.
Published: 2026-01-15
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Write
Action: Apply Patch
AI Analysis

Impact

Docmost’s Zip Import feature allows uploading compressed archives containing files. Because the implementation performs no validation on the listed filenames, an attacker can craft archive entries whose names include directory traversal components or absolute paths, causing the server to write files anywhere on the filesystem that the process can reach. This vulnerability, classified as CWE‑22, permits arbitrary file creation or overwrite, potentially compromising data integrity and confidentiality. Based on the description, it is inferred that if the application later executes or loads the written files, this could enable remote code execution or configuration tampering, though such a consequence has not been demonstrated in the supplied advisory.

Affected Systems

The issue affects all Docmost instances running versions 0.21.0 through 0.23.x, inclusive. Any installation that exposes the zip import endpoint to users—whether via the web UI or API—falls within the impacted range. The fix is addressed in release 0.24.0, which adds filename validation before extraction.

Risk and Exploitability

With a CVSS score of 7.1, the flaw is considered moderate to high in severity. The EPSS score of less than 1 % indicates a currently low likelihood of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Attackers would need to supply a malicious zip file, presumably via an upload API or web form; the lack of validation allows arbitrary relative paths to map to server locations during extraction. Successful exploitation requires only the ability to upload a zip and that the server process has write permission to the target directories.

Generated by OpenCVE AI on April 18, 2026 at 16:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Docmost to version 0.24.0 or later, which implements strict validation of filenames during zip extraction.
  • If an upgrade cannot be performed immediately, restrict usage of the zip import function to trusted administrators or temporarily disable the endpoint to prevent unintended file writes.
  • As a temporary defense, add server‑side validation that strips leading slashes, normalizes paths, and rejects entries containing path traversal sequences before performing the extraction.

Generated by OpenCVE AI on April 18, 2026 at 16:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 22 Jan 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:docmost:docmost:*:*:*:*:*:*:*:*

Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Docmost
Docmost docmost
Vendors & Products Docmost
Docmost docmost

Thu, 15 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 Jan 2026 19:00:00 +0000

Type Values Removed Values Added
Description Docmost is an open-source collaborative wiki and documentation software. From 0.21.0 to before 0.24.0, Docmost is vulnerable to Arbitrary File Write via Zip Import Feature (ZipSlip). In apps/server/src/integrations/import/utils/file.utils.ts, there are no validation on filename. This vulnerability is fixed in 0.24.0.
Title Docmost affected by an Arbitrary File Write via Zip Import Feature (ZipSlip)
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-15T19:08:26.158Z

Reserved: 2026-01-07T05:19:12.921Z

Link: CVE-2026-22249

cve-icon Vulnrichment

Updated: 2026-01-15T19:08:18.085Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-15T19:16:05.527

Modified: 2026-01-22T15:44:51.040

Link: CVE-2026-22249

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:15:04Z

Weaknesses