Impact
A flaw exists in Newgen OmniDocs v12.0.00 and earlier that allows remote actors to send a specially crafted connectionDetails parameter to the /omnidocs/GetWebApiConfiguration endpoint. The server responds with sensitive configuration information, leading to an unauthorized disclosure of data. The weakness corresponds to information‑disclosure and unauthorized access control failures, as reflected by CWE‑200 and CWE‑284.
Affected Systems
The affected product is Newgen OmniDocs, versions up to and including 12.0.00. Any installation that exposes the /omnidocs/GetWebApiConfiguration endpoint without proper access controls is within risk scope.
Risk and Exploitability
The CVSS score of 6.3 places the vulnerability in the medium severity range. The EPSS score is not available and the issue is not listed in CISA’s KEV catalog. The attack vector is remote, presumably over HTTP or HTTPS, and is considered difficult due to high complexity. However, an exploit is publicly available, thereby reducing the barrier for attackers. Organizations running vulnerable OmniDocs deployments face a moderate risk of unauthorized information exposure.
OpenCVE Enrichment