Docmost is open-source collaborative wiki and documentation software. In versions prior to 0.71.0, improper neutralization of attachment URLs in Docmost allows a low-privileged authenticated user to store a malicious `javascript:` URL inside an attachment node in page content. When another user views the page and activates the attachment link/icon, attacker-controlled JavaScript executes in the context of the Docmost origin. Version 0.71.0 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/docmost/docmost/security/advisories/GHSA-cf68-cff9-hq4w | Exploit Vendor Advisory |
Configurations
History
22 Apr 2026, 18:47
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:docmost:docmost:*:*:*:*:*:*:*:* | |
| References | () https://github.com/docmost/docmost/security/advisories/GHSA-cf68-cff9-hq4w - Exploit, Vendor Advisory | |
| First Time |
Docmost
Docmost docmost |
14 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-14 22:16
Updated : 2026-04-22 18:47
NVD link : CVE-2026-34212
Mitre link : CVE-2026-34212
CVE.ORG link : CVE-2026-34212
JSON object : View
Products Affected
docmost
- docmost
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
