Vulnerability Description
Note Mark is an open-source note-taking application. Prior to version 0.19.3, after a note-mark owner soft-deletes a public book, its notes and uploaded assets stay readable at /api/notes/{id}, /api/notes/{id}/content, the slug URL, and the asset endpoints. Unauthenticated callers who hold the note ID or the slug path retain access. GORM's soft-delete scope does not reach the raw "JOIN books ..." clauses used by the note and asset queries. This issue has been patched in version 0.19.3.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/enchant97/note-mark/releases/tag/v0.19.3
- https://github.com/enchant97/note-mark/security/advisories/GHSA-3gr9-485j-v4xf
- https://github.com/enchant97/note-mark/security/advisories/GHSA-3gr9-485j-v4xf
FAQ
What is CVE-2026-41572?
CVE-2026-41572 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Note Mark is an open-source note-taking application. Prior to version 0.19.3, after a note-mark owner soft-deletes a public book, its notes and uploaded assets stay readable at /api/notes/{id}, /api/n...
How severe is CVE-2026-41572?
CVE-2026-41572 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41572?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.