Impact
A logic error in Joplin Server’s delta API allows recipients of previously shared notes to receive the full content of notes that have been revoked, exposing confidential information. The flaw stems from the API failing to verify that returned items remain shared with the requesting user and from incorrect change compression logic that can leave a delete operation ineffective. This results in a confidentiality breach categorized by CWE‑200, CWE‑281, and CWE‑863.
Affected Systems
The vulnerability affects the Joplin note‑taking application from vendor laurent22. Versions 3.5.2 and earlier are impacted; users of those releases should verify the installed version.
Risk and Exploitability
The CVSS score of 5.7 indicates a moderate severity that allows data exposure when the API is called. No EPSS score was reported and the vulnerability is not listed in CISA KEV, suggesting the exploit likelihood is currently unknown. However, because the issue arises from an authenticated API call, any user with access to the delta endpoint for a previously shared note can trigger the data leak.
OpenCVE Enrichment