NIXPKGS-2026-0143
GitHub issue
published on 7 Feb 2026
Permalink
CVE-2026-25642
4.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package hedgedoc-cli
- @LeSuisse accepted
- @LeSuisse published on GitHub
HedgeDoc security headers for uploaded files were not working
HedgeDoc is an open source, real-time, collaborative, markdown notes application. Prior to 1.10.6, files served below the /uploads/ endpoint did not use a more strict security-policy. This resulted in a too open Content-Security-Policy and furthermore opened the possibility to host malicious interactive web content (such as fake login forms) using SVG files. This vulnerability is fixed in 1.10.6.
References
- https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-x74j-jmf9-534w x_refsource_CONFIRM
- https://github.com/hedgedoc/hedgedoc/commit/74daa0e7a1cbfafd9aeb255eaf064dfe47cd401c x_refsource_MISC
- https://github.com/hedgedoc/hedgedoc/commit/b930fe04cee92cd4723044030bb59c36781c7137 x_refsource_MISC
- https://github.com/hedgedoc/hedgedoc/releases/tag/1.10.6 x_refsource_MISC
Affected products
hedgedoc
- ==< 1.10.6
Package maintainers
-
@SuperSandro2000 Sandro Jäckel <sandro.jaeckel@gmail.com>