Home

Description

Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, the Papra webhook system allows authenticated users to register arbitrary URLs as webhook endpoints with no validation of the destination address. The server makes outbound HTTP POST requests to registered URLs, including localhost, internal network ranges, and cloud provider metadata endpoints, on every document event. This vulnerability is fixed in 26.4.0.

PUBLISHED Reserved 2026-04-02 | Published 2026-04-07 | Updated 2026-04-09 | Assigner GitHub_M




MEDIUM: 5.0CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 26.4.0
affected

References

github.com/.../papra/security/advisories/GHSA-cjw7-qg95-58mq exploit

github.com/.../papra/security/advisories/GHSA-cjw7-qg95-58mq

cve.org (CVE-2026-35461)

nvd.nist.gov (CVE-2026-35461)

Download JSON