Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.4

Docmost: Malicious JavaScript Can Run When Viewing Attachments

CVE-2026-34212
Summary

Versions of Docmost prior to 0.71.0 have a security issue where a malicious user can trick another user into running their own JavaScript code when viewing a specially crafted attachment. This can happen even if the malicious user doesn't have administrative privileges. To stay safe, update to version 0.71.0 or later.

Original title
Docmost is open-source collaborative wiki and documentation software. In versions prior to 0.71.0, improper neutralization of attachment URLs in Docmost allows a low-privileged authenticated user t...
Original description
Docmost is open-source collaborative wiki and documentation software. In versions prior to 0.71.0, improper neutralization of attachment URLs in Docmost allows a low-privileged authenticated user to store a malicious `javascript:` URL inside an attachment node in page content. When another user views the page and activates the attachment link/icon, attacker-controlled JavaScript executes in the context of the Docmost origin. Version 0.71.0 patches the issue.
nvd CVSS3.1 5.4
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 14 Apr 2026 · Updated: 16 Apr 2026 · First seen: 14 Apr 2026