Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
No-instructions
No-instructions relay-server |
|
| Vendors & Products |
No-instructions
No-instructions relay-server |
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Relay adds real-time collaboration to Obsidian. Relay Server versions 0.9.0 through 0.9.6 contain an authentication bypass in the multi-document WebSocket endpoints. When authentication is configured, WebSocket connections without a token query parameter were incorrectly treated as having full server permissions. An unauthenticated network attacker who knows or guesses a document ID could connect to the document sync WebSocket and read or modify document contents without a valid document token. This vulnerability is fixed in 0.9.7. | |
| Title | Relay Server WebSocket authentication bypass when token is omitted | |
| Weaknesses | CWE-639 CWE-863 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T12:32:58.746Z
Reserved: 2026-04-30T18:49:06.712Z
Link: CVE-2026-42889
Updated: 2026-05-13T12:32:04.312Z
Status : Deferred
Published: 2026-05-12T20:16:42.143
Modified: 2026-05-13T18:21:10.270
Link: CVE-2026-42889
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:36:20Z