Home

Description

Outline is a service that allows for collaborative documentation. From 0.84.0 to 1.7.0, the subscriptions.create API endpoint in server/routes/api/subscriptions/subscriptions.ts exhibits a broken authorization pattern. When both collectionId and documentId are supplied in the request, the route handler authorizes ONLY the collection branch (line 125 if (collectionId)), while the downstream subscriptionCreator command at server/commands/subscriptionCreator.ts writes the subscription against the documentId (which was never validated). The result is a subscription record pinning the attacker's user to a victim document the attacker has no read access to, on any team in the instance. The schema (server/routes/api/subscriptions/schema.ts) only enforces "at least one of collectionId/documentId" via .refine() — it does NOT enforce mutual exclusivity, so passing both is a valid, schema-conforming request. This vulnerability is fixed in 1.7.1.

PUBLISHED Reserved 2026-05-04 | Published 2026-05-11 | Updated 2026-05-13 | Assigner GitHub_M




HIGH: 7.7CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

>= 0.82.1, < 1.7.1
affected

References

github.com/...utline/security/advisories/GHSA-gf8h-cv9v-q4fw exploit

github.com/...utline/security/advisories/GHSA-gf8h-cv9v-q4fw

cve.org (CVE-2026-43890)

nvd.nist.gov (CVE-2026-43890)

Download JSON