Description
Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, API keys with an expiresAt date are never validated against the current time during authentication. Any API key — regardless of its expiration date — is accepted indefinitely, allowing a user whose key has expired to continue accessing all protected endpoints as if the key were still valid. This vulnerability is fixed in 26.4.0.
Published: 2026-04-07
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access via Expired API Key
Action: Apply Patch
AI Analysis

Impact

Papra, a minimalistic document management platform, has a flaw where API keys with an expiration timestamp are never checked against the current time during authentication. As a result, any key—regardless of whether it has expired—continues to be accepted indefinitely. This weakness allows a holder of an expired key to access protected endpoints as if the key were still valid, effectively granting unauthorized access. The issue represents a failure to perform authentication with a time‑based constraint, classified as CWE‑613.

Affected Systems

The vulnerability affects all Papra releases before version 26.4.0. Users running versions earlier than 26.4.0 may find that any API key they have issued remains usable even after its expiresAt value has passed. The product is papra‑hq:papra, and the fix was implemented in the 26.4.0 release.

Risk and Exploitability

The CVSS score of 4.3 indicates a medium severity vulnerability. The EPSS score is not available, and the flaw is not listed in the KEV catalog, suggesting limited observed exploitation to date. Based on the description, it is inferred that the attack vector is remote and depends on an attacker’s possession of an API key, which could be obtained via phishing, credential theft, or accidental sharing. Because the key is accepted without expiration validation, an attacker could reuse it indefinitely, creating a persistent risk until a patch is applied. Overall, the risk remains moderate, but continuous unauthorized access could occur if the issue is not addressed promptly.

Generated by OpenCVE AI on April 7, 2026 at 20:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Papra to version 26.4.0 or later, which enforces proper expiration checking.
  • Revoke all existing API keys, especially those that have expired, and issue new keys.
  • Audit the key database to confirm no expired keys remain active after the patch.
  • If upgrading immediately is not possible, temporarily disable expired keys and monitor API usage for suspicious activity.

Generated by OpenCVE AI on April 7, 2026 at 20:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 24 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Papra
Papra papra
CPEs cpe:2.3:a:papra:papra:*:*:*:*:*:*:*:*
Vendors & Products Papra
Papra papra

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Papra-hq
Papra-hq papra
Vendors & Products Papra-hq
Papra-hq papra

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, API keys with an expiresAt date are never validated against the current time during authentication. Any API key — regardless of its expiration date — is accepted indefinitely, allowing a user whose key has expired to continue accessing all protected endpoints as if the key were still valid. This vulnerability is fixed in 26.4.0.
Title Papra Does Not Reject Expired API Keys
Weaknesses CWE-613
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T17:54:02.880Z

Reserved: 2026-04-02T19:25:52.193Z

Link: CVE-2026-35462

cve-icon Vulnrichment

Updated: 2026-04-07T17:53:58.069Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T15:17:44.197

Modified: 2026-04-24T15:22:51.067

Link: CVE-2026-35462

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:48:48Z

Weaknesses