Description
Docmost is open-source collaborative wiki and documentation software. Starting in version 0.3.0 and prior to version 0.71.0, improper authorization in Docmost allows a low-privileged authenticated user to overwrite another page's attachment within the same workspace by supplying a victim `attachmentId` to `POST /api/files/upload`. This is a remote integrity issue requiring no victim interaction. Version 0.71.0 contains a patch.
Published: 2026-04-14
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Integrity
Action: Apply patch
AI Analysis

Impact

The flaw is an improper authorization check that permits a low‑privileged authenticated user to overwrite an attachment uploaded to another page within the same workspace by supplying the victim’s attachmentId to the file upload endpoint. This allows the attacker to replace a legitimate file with a malicious or altered version, thereby compromising data integrity. The vulnerability is a remote integrity issue that requires no victim interaction and is identified as CWE‑639 (Access Control for Multi‑Level Security).

Affected Systems

Docmost collaborative wiki and documentation software is affected. Versions beginning at 0.3.0 up to, but not including, 0.71.0 are vulnerable. All installations of these versions that allow authenticated users to upload attachments are at risk.

Risk and Exploitability

The CVSS score of 5.4 indicates a moderate level of risk. EPSS is not available, suggesting no known exploit activity at the time of analysis, and the vulnerability is not listed in the CISA KEV catalog. Because the exploit requires only authenticated access within a workspace, a legitimate low‑privileged user or attacker who has compromised account credentials can execute the attack remotely and immediately, making the risk realistic for environments with loose user permissions.

Generated by OpenCVE AI on April 14, 2026 at 23:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Docmost to version 0.71.0 or later, which removes the flawed authorization check on the attachment upload endpoint.
  • If an upgrade is not feasible, restrict user roles that can upload attachments or disable the POST /api/files/upload endpoint for low‑privileged users to eliminate the attack surface.
  • Monitor attachment upload logs for unexpected use of known attachmentIds, and investigate any anomalous activity that could indicate exploitation of this flaw.

Generated by OpenCVE AI on April 14, 2026 at 23:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:docmost:docmost:*:*:*:*:*:*:*:*

Wed, 15 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Docmost
Docmost docmost
Vendors & Products Docmost
Docmost docmost

Tue, 14 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
Description Docmost is open-source collaborative wiki and documentation software. Starting in version 0.3.0 and prior to version 0.71.0, improper authorization in Docmost allows a low-privileged authenticated user to overwrite another page's attachment within the same workspace by supplying a victim `attachmentId` to `POST /api/files/upload`. This is a remote integrity issue requiring no victim interaction. Version 0.71.0 contains a patch.
Title Docmost has cross-page attachment overwrite via flawed attachmentId overwrite validation
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-15T13:31:17.467Z

Reserved: 2026-03-26T15:57:52.324Z

Link: CVE-2026-34213

cve-icon Vulnrichment

Updated: 2026-04-15T13:31:14.745Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-14T22:16:31.193

Modified: 2026-04-22T18:46:54.730

Link: CVE-2026-34213

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:31:57Z

Weaknesses