Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:docmost:docmost:*:*:*:*:*:*:*:* |
Wed, 15 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Docmost
Docmost docmost |
|
| Vendors & Products |
Docmost
Docmost docmost |
Tue, 14 Apr 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Docmost is open-source collaborative wiki and documentation software. In versions prior to 0.71.0, improper neutralization of attachment URLs in Docmost allows a low-privileged authenticated user to store a malicious `javascript:` URL inside an attachment node in page content. When another user views the page and activates the attachment link/icon, attacker-controlled JavaScript executes in the context of the Docmost origin. Version 0.71.0 patches the issue. | |
| Title | Docmost page content has stored XSS via unsanitized attachment URLs | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-15T20:02:55.239Z
Reserved: 2026-03-26T15:57:52.324Z
Link: CVE-2026-34212
Updated: 2026-04-15T18:56:36.047Z
Status : Analyzed
Published: 2026-04-14T22:16:31.020
Modified: 2026-04-22T18:47:08.987
Link: CVE-2026-34212
No data.
OpenCVE Enrichment
Updated: 2026-04-15T14:31:57Z