Description
HedgeDoc is an open source, real-time, collaborative, markdown notes application. Prior to 1.10.6, files served below the /uploads/ endpoint did not use a more strict security-policy. This resulted in a too open Content-Security-Policy and furthermore opened the possibility to host malicious interactive web content (such as fake login forms) using SVG files. This vulnerability is fixed in 1.10.6.
Published: 2026-02-06
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential malicious interactive content execution via overly permissive Content‑Security‑Policy
Action: Patch
AI Analysis

Impact

The vulnerability arises from insecure Content‑Security‑Policy headers on files served under the /uploads/ endpoint in HedgeDoc versions prior to 1.10.6. A too‑open policy allows an attacker to upload interactive web content, such as maliciously crafted SVG files or fake login forms, that the browser will execute within the context of the application. This weakness, identified as CWE‑79, enables cross‑site scripting‑like payloads to run in a logged‑in user’s browser, potentially compromising confidentiality or integrity of that user’s session.

Affected Systems

Affected deployments include any HedgeDoc installation running the hedgedoc/hedgedoc package before version 1.10.6, where files are accessible via the /uploads/ URL. The patch is available in release 1.10.6, so any system not yet upgraded to that version is vulnerable.

Risk and Exploitability

The CVSS base score of 4.3 indicates a moderate severity. The EPSS score of less than 1% reflects a low probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires the attacker to supply a crafted SVG file and for a user to view it, a scenario that often relies on social engineering or internal compromise of the upload functionality. While the risk is primarily to users who view uploaded content they did not create, administrators should treat it as a medium‑risk issue until the patch is applied.

Generated by OpenCVE AI on April 17, 2026 at 22:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update HedgeDoc to version 1.10.6 or later.
  • If upgrading is not immediately possible, restrict the /uploads/ path to serve only safe file types and validate uploaded content more strictly.
  • Manually enforce a stricter Content‑Security‑Policy for files served from the /uploads/ endpoint, for example by setting "Content‑Security‑Policy: default-src 'none'; script-src 'none'; object-src 'none';" to prevent execution of SVG scripts.

Generated by OpenCVE AI on April 17, 2026 at 22:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hedgedoc:hedgedoc:*:*:*:*:*:*:*:*

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Hedgedoc
Hedgedoc hedgedoc
Vendors & Products Hedgedoc
Hedgedoc hedgedoc

Fri, 06 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description HedgeDoc is an open source, real-time, collaborative, markdown notes application. Prior to 1.10.6, files served below the /uploads/ endpoint did not use a more strict security-policy. This resulted in a too open Content-Security-Policy and furthermore opened the possibility to host malicious interactive web content (such as fake login forms) using SVG files. This vulnerability is fixed in 1.10.6.
Title HedgeDoc security headers for uploaded files were not working
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Hedgedoc Hedgedoc
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-06T20:20:58.376Z

Reserved: 2026-02-04T05:15:41.791Z

Link: CVE-2026-25642

cve-icon Vulnrichment

Updated: 2026-02-06T20:20:54.316Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T20:16:11.437

Modified: 2026-02-25T14:45:01.257

Link: CVE-2026-25642

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:45:29Z

Weaknesses