Description
Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, the Papra webhook system allows authenticated users to register arbitrary URLs as webhook endpoints with no validation of the destination address. The server makes outbound HTTP POST requests to registered URLs, including localhost, internal network ranges, and cloud provider metadata endpoints, on every document event. This vulnerability is fixed in 26.4.0.
Published: 2026-04-07
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Blind Server‑Side Request Forgery
Action: Patch Immediately
AI Analysis

Impact

Papra’s webhook system, before version 26.4.0, allows authenticated users to register any URL as a webhook without validating the destination. When a document event occurs, the server automatically posts to those URLs, which can include internal network ranges, localhost, or cloud metadata services. The vulnerability is performed in a blind fashion: the attacker cannot see the response from the target, but can cause the server to reach internal or metadata endpoints, potentially exposing privileged information or enabling further exploitation. The weakness is identified as CWE‑918.

Affected Systems

The affected product is Papra, a document management and archiving platform. The vulnerability exists in all releases prior to 26.4.0.

Risk and Exploitability

The CVSS score is 5, indicating moderate severity. EPSS information is not available, and the vulnerability is not listed in CISA’s KEV catalog, implying no known public exploits at this time. The attack vector requires an authenticated user to register a webhook, after which the server performs outbound POST requests. Once a malicious webhook URL has been registered, any subsequent document event will trigger an outbound request to the attacker‑controlled endpoint, allowing the attacker to probe internal resources or access cloud metadata. The risk to confidentiality and availability depends on the internal environment accessed through the blind SSRF.

Generated by OpenCVE AI on April 7, 2026 at 19:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Papra to version 26.4.0 or later to remove the unvalidated webhook registration flaw.
  • If an upgrade is not immediately possible, restrict the webhook URL field to a whitelist of approved domains or enforce input validation to block localhost and private IP ranges.
  • As a temporary measure, disable user registration of new webhooks or limit functionality to trusted administrative accounts until a fix is applied.

Generated by OpenCVE AI on April 7, 2026 at 19:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 24 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Papra
Papra papra
CPEs cpe:2.3:a:papra:papra:*:*:*:*:*:*:*:*
Vendors & Products Papra
Papra papra

Thu, 09 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Papra-hq
Papra-hq papra
Vendors & Products Papra-hq
Papra-hq papra

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, the Papra webhook system allows authenticated users to register arbitrary URLs as webhook endpoints with no validation of the destination address. The server makes outbound HTTP POST requests to registered URLs, including localhost, internal network ranges, and cloud provider metadata endpoints, on every document event. This vulnerability is fixed in 26.4.0.
Title Papra has a Blind Server-Side Request Forgery (SSRF) via Webhook URL
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-09T14:41:13.998Z

Reserved: 2026-04-02T19:25:52.193Z

Link: CVE-2026-35461

cve-icon Vulnrichment

Updated: 2026-04-09T14:41:04.916Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T15:17:44.047

Modified: 2026-04-24T15:29:00.790

Link: CVE-2026-35461

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:48:49Z

Weaknesses