Description
A vulnerability was identified in doramart DoraCMS 3.0.x. This issue affects some unknown processing of the file /api/v1/mail/send of the component Email API. Such manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper Authentication via Email API
Action: Patch ASAP
AI Analysis

Impact

A flaw in the Email API endpoint (/api/v1/mail/send) of doramart DoraCMS 3.0.x allows remote attackers to bypass authentication and perform the API action without proper credentials. The vulnerability is a classic example of CWE‑287, improper authentication, and could lead to unauthorized email sending or other privileged actions within the CMS. Publicly available exploit code indicates that the issue can be leveraged from outside the network, potentially enabling attackers to gain unauthorized access.

Affected Systems

The affected product is doramart DoraCMS version 3.0.x. No specific patch or version is listed; the vendor has not published an update or response yet.

Risk and Exploitability

The CVSS score of 6.9 places this issue in the Medium severity range, yet the exploit is publicly available and can be initiated remotely. The EPSS score of <1% suggests a low but non‑zero likelihood of exploitation in the wild, and the vulnerability is not currently tracked in the CISA Known Exploited Vulnerabilities catalog. Because the bug involves illegal access to an authenticated API, attackers with knowledge of the endpoint could potentially use it to propagate spam or other malicious content.

Generated by OpenCVE AI on April 16, 2026 at 04:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade doramart DoraCMS to a version that resolves the Email API authentication flaw or apply any vendor‑issued patch.
  • Restrict access to the /api/v1/mail/send endpoint to authenticated users only, for example by enforcing token‑based authentication or limiting IP ranges.
  • Disable the Email API feature if it is not required for your deployment, or perform additional input validation to ensure that only authorized requests are honored.

Generated by OpenCVE AI on April 16, 2026 at 04:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Html-js
Html-js doracms
CPEs cpe:2.3:a:html-js:doracms:-:*:*:*:*:*:*:*
Vendors & Products Html-js
Html-js doracms

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Doramart
Doramart doracms
Vendors & Products Doramart
Doramart doracms

Mon, 09 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in doramart DoraCMS 3.0.x. This issue affects some unknown processing of the file /api/v1/mail/send of the component Email API. Such manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title doramart DoraCMS Email API send improper authentication
Weaknesses CWE-287
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-25T12:33:55.463Z

Reserved: 2026-03-08T07:31:54.271Z

Link: CVE-2026-3794

cve-icon Vulnrichment

Updated: 2026-03-10T20:19:37.564Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T03:15:49.293

Modified: 2026-03-10T18:50:00.857

Link: CVE-2026-3794

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:15:24Z

Weaknesses