Vulnerability Description
Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, the Papra webhook system allows authenticated users to register arbitrary URLs as webhook endpoints with no validation of the destination address. The server makes outbound HTTP POST requests to registered URLs, including localhost, internal network ranges, and cloud provider metadata endpoints, on every document event. This vulnerability is fixed in 26.4.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Papra | Papra | < 26.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/papra-hq/papra/security/advisories/GHSA-cjw7-qg95-58mqExploitVendor Advisory
- https://github.com/papra-hq/papra/security/advisories/GHSA-cjw7-qg95-58mqExploitVendor Advisory
FAQ
What is CVE-2026-35461?
CVE-2026-35461 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, the Papra webhook system allows authenticated users to register arbitrary URLs as webhook endpoints with no validat...
How severe is CVE-2026-35461?
CVE-2026-35461 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-35461?
Check the references section above for vendor advisories and patch information. Affected products include: Papra Papra.