Description
Decidim is a participatory democracy framework. Starting in version 0.0.1 and prior to versions 0.30.5 and 0.31.1, the root level `commentable` field in the API allows access to all commentable resources within the platform, without any permission checks. All Decidim instances are impacted that have not secured the `/api` endpoint. The `/api` endpoint is publicly available with the default configuration. Versions 0.30.5 and 0.31.1 fix the issue. As a workaround, limit the scope to only authenticated users by limiting access to the `/api` endpoint. This would require custom code or installing the 3rd party module `Decidim::Apiauth`. With custom code, the `/api` endpoint can be limited to only authenticated users. The same configuration can be also used without the `allow` statements to disable all traffic to the the `/api` endpoint. When considering a workaround and the seriousness of the vulnerability, please consider the nature of the platform. If the platform is primarily serving public data, this vulnerability is not serious by its nature. If the platform is protecting some resources, e.g. inside private participation spaces, the vulnerability may expose some data to the attacker that is not meant public. For those who have enabled the organization setting "Force users to authenticate before access organization", the scope of this vulnerability is limited to the users who are allowed to log in to the Decidim platform. This setting was introduced in version 0.19.0 and it was applied to the `/api` endpoint in version 0.22.0.
Published: 2026-04-21
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access to all commentable resources via API
Action: Apply Fix
AI Analysis

Impact

Decidim’s root level commentable field in the API does not perform any permission checks, which allows an attacker to retrieve all commentable resources from the platform. The missing authorization logic means that anyone who can reach the /api endpoint can see content that may be intended for private or restricted audiences. Because the flaw is purely an authorization failure (CWE‑862), it results in information disclosure but does not permit code execution or privilege escalation directly.

Affected Systems

All deployments of Decidim using version 0.0.1 up through 0.30.4 and 0.31.0 that have the default, publicly accessible /api endpoint are affected. The issue was fixed in Decidim releases 0.30.5 and 0.31.1; earlier versions without the fix remain vulnerable. Any instance that has not applied limiting access to the /api endpoint or does not enforce authentication for API requests is impacted.

Risk and Exploitability

The CVSS base score of 7.5 indicates a medium‑to‑high severity vulnerability. No EPSS score is available, but the exposure of potentially sensitive community or organizational data makes the risk significant for platforms that host private participation spaces. The flaw can be exploited remotely by making HTTP requests to the public /api endpoint, and the attacker does not require any prior authentication unless the platform has enabled the “Force users to authenticate before access organization” setting. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is remote API exploitation through public network access, and the impact is information disclosure of commentable resources that are otherwise restricted.

Generated by OpenCVE AI on April 22, 2026 at 05:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Decidim to version 0.30.5 or newer, or to 0.31.1 where the bug is fixed
  • Configure the application or network to block or require authentication for all traffic to the /api endpoint, for example by installing Decidim::Apiauth or adding allow/deny rules
  • If immediate upgrade is not possible, restrict the /api endpoint to authenticated users only or disable the endpoint entirely when not in use
  • Consider enabling the organization setting “Force users to authenticate before access organization” (available from version 0.19.0) to limit the data exposed to authenticated users only

Generated by OpenCVE AI on April 22, 2026 at 05:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
First Time appeared Decidim
Decidim decidim
Vendors & Products Decidim
Decidim decidim

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Decidim is a participatory democracy framework. Starting in version 0.0.1 and prior to versions 0.30.5 and 0.31.1, the root level `commentable` field in the API allows access to all commentable resources within the platform, without any permission checks. All Decidim instances are impacted that have not secured the `/api` endpoint. The `/api` endpoint is publicly available with the default configuration. Versions 0.30.5 and 0.31.1 fix the issue. As a workaround, limit the scope to only authenticated users by limiting access to the `/api` endpoint. This would require custom code or installing the 3rd party module `Decidim::Apiauth`. With custom code, the `/api` endpoint can be limited to only authenticated users. The same configuration can be also used without the `allow` statements to disable all traffic to the the `/api` endpoint. When considering a workaround and the seriousness of the vulnerability, please consider the nature of the platform. If the platform is primarily serving public data, this vulnerability is not serious by its nature. If the platform is protecting some resources, e.g. inside private participation spaces, the vulnerability may expose some data to the attacker that is not meant public. For those who have enabled the organization setting "Force users to authenticate before access organization", the scope of this vulnerability is limited to the users who are allowed to log in to the Decidim platform. This setting was introduced in version 0.19.0 and it was applied to the `/api` endpoint in version 0.22.0.
Title Decidim's comments API allows access to all commentable resources
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-21T19:52:15.178Z

Reserved: 2026-04-15T15:57:41.718Z

Link: CVE-2026-40870

cve-icon Vulnrichment

Updated: 2026-04-21T19:52:10.363Z

cve-icon NVD

Status : Deferred

Published: 2026-04-21T20:17:00.367

Modified: 2026-04-22T21:08:48.550

Link: CVE-2026-40870

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T05:45:09Z

Weaknesses