Vulnerability Description
Docmost is open-source collaborative wiki and documentation software. In versions prior to 0.71.0, improper neutralization of attachment URLs in Docmost allows a low-privileged authenticated user to store a malicious `javascript:` URL inside an attachment node in page content. When another user views the page and activates the attachment link/icon, attacker-controlled JavaScript executes in the context of the Docmost origin. Version 0.71.0 patches the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Docmost | Docmost | < 0.71.0 |
Related Weaknesses (CWE)
References
- https://github.com/docmost/docmost/security/advisories/GHSA-cf68-cff9-hq4wExploitVendor Advisory
FAQ
What is CVE-2026-34212?
CVE-2026-34212 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Docmost is open-source collaborative wiki and documentation software. In versions prior to 0.71.0, improper neutralization of attachment URLs in Docmost allows a low-privileged authenticated user to s...
How severe is CVE-2026-34212?
CVE-2026-34212 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34212?
Check the references section above for vendor advisories and patch information. Affected products include: Docmost Docmost.