Description
Docmost is open-source collaborative wiki and documentation software. An authorization bypass vulnerability in versions 0.70.0 through 0.70.2 exposes restricted child page titles and text snippets through the public search endpoint (`POST /api/search/share-search`) for publicly shared content. This flaw allows unauthenticated users to enumerate and retrieve content that should remain hidden from public share viewers, leading to a confidentiality breach. Version 0.70.3 contains a patch.
Published: 2026-04-14
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality breach
Action: Apply patch
AI Analysis

Impact

Docmost versions 0.70.0 through 0.70.2 contain an authorization bypass that allows unauthenticated users to retrieve titles and text snippets of restricted child pages via the public share search endpoint (POST /api/search/share-search). This flaw permits enumeration of hidden content that should be visible only to authorized viewers, exposing sensitive metadata and leading to a confidentiality breach. The weakness is an insufficient authorization (CWE‑285).

Affected Systems

The affected product is the Docmost open‑source collaborative wiki and documentation software. Users running Docmost versions 0.70.0, 0.70.1, or 0.70.2 are vulnerable. Version 0.70.3 includes the patch that disables the metadata exposure. No other vendors or products are noted.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity. The exploit is triggered solely by making unauthenticated HTTP requests to the search API, so the attack vector is remote and requires no special privileges. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, suggesting that no widely known exploits exist yet. Nevertheless, the simplicity of the request route means that an attacker could feasibly enumerate restricted content, potentially compromising sensitive information. The overall risk is moderate with a focus on confidentiality.

Generated by OpenCVE AI on April 14, 2026 at 23:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Docmost to version 0.70.3 or later to apply the vendor‑supplied patch that removes the metadata exposure.
  • If the public share search feature is not required, disable or restrict access to the /api/search/share-search endpoint to prevent unauthorized use.
  • Ensure child page permissions are correctly configured so only authorized users can view content, and periodically review access control settings for any accidental exposure.

Generated by OpenCVE AI on April 14, 2026 at 23:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Docmost
Docmost docmost
Vendors & Products Docmost
Docmost docmost

Tue, 14 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
Description Docmost is open-source collaborative wiki and documentation software. An authorization bypass vulnerability in versions 0.70.0 through 0.70.2 exposes restricted child page titles and text snippets through the public search endpoint (`POST /api/search/share-search`) for publicly shared content. This flaw allows unauthenticated users to enumerate and retrieve content that should remain hidden from public share viewers, leading to a confidentiality breach. Version 0.70.3 contains a patch.
Title Docmost's Public Share Search Exposes Metadata of Restricted Children
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-15T14:28:08.044Z

Reserved: 2026-03-17T21:17:08.884Z

Link: CVE-2026-33146

cve-icon Vulnrichment

Updated: 2026-04-15T14:28:04.553Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-14T22:16:30.713

Modified: 2026-04-17T15:38:09.243

Link: CVE-2026-33146

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:31:57Z

Weaknesses