Decidim API Flaw Exposes Sensitive Participatory Data

Decidim API Flaw Exposes Sensitive Participatory Data

The National Vulnerability Database has detailed CVE-2026-40870, a high-severity vulnerability (CVSS 7.5) affecting Decidim, a participatory democracy framework. Versions from 0.0.1 up to, but not including, 0.30.5 and 0.31.1 are impacted. The core issue lies within the root-level commentable field in the API, which, by default, grants access to all commentable resources without proper permission checks. This means sensitive data intended for private participation spaces could be exposed if the /api endpoint is not secured.

All Decidim instances are vulnerable if the /api endpoint remains publicly accessible, which is the default configuration. While the National Vulnerability Database notes that the severity lessens if the platform primarily serves public data, it becomes critical when protecting private resources. The vulnerability’s scope is further limited for instances that have enabled the “Force users to authenticate before access organization” setting (introduced in 0.19.0 and applied to the /api endpoint in 0.22.0), restricting exposure to authenticated users only.

Patches are available in Decidim versions 0.30.5 and 0.31.1. For those unable to upgrade immediately, a workaround involves limiting /api endpoint access to authenticated users. This requires custom code or implementing the Decidim::Apiauth module. Alternatively, administrators can disable all traffic to the /api endpoint by removing allow statements, effectively mitigating the direct exposure.

What This Means For You

  • If your organization uses Decidim, prioritize immediate patching to versions 0.30.5 or 0.31.1. If patching isn't feasible, implement the workaround to restrict `/api` endpoint access to authenticated users or disable it entirely. Audit your Decidim instance to determine if private participation spaces could have been exposed and assess potential data leaks.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

Decidim API Unauthenticated Access to Commentable Resources - CVE-2026-40870

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40870 Information Disclosure Decidim versions 0.0.1 up to 0.30.4 and 0.31.0
CVE-2026-40870 Auth Bypass Decidim API endpoint /api
CVE-2026-40870 Information Disclosure Decidim API 'commentable' field
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 21, 2026 at 23:17 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

HKUDS OpenHarness Default Config Exposes Systems (CVE-2026-6823)

CVE-2026-6823 — HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote...

vulnerabilityCVEhigh-severitycwe-276
/SCW Vulnerability Desk /HIGH /8.2 /⚑ 3 IOCs /⚙ 3 Sigma

Critical AVideo XSS Vulnerability Exposes Admin Settings

CVE-2026-40925 — WWBN AVideo is an open source video platform. In versions 29.0 and prior, `objects/configurationUpdate.json.php` (also routed via `/updateConfig`) persists dozens of global site...

vulnerabilityCVEhigh-severitycwe-352
/SCW Vulnerability Desk /HIGH /8.3 /⚑ 5 IOCs /⚙ 3 Sigma

Critical RCE in AVideo YPTSocket Plugin: Unauthenticated Account Takeover

CVE-2026-40911 — WWBN AVideo is an open source video platform. In versions 29.0 and prior, the YPTSocket plugin's WebSocket server relays attacker-supplied JSON message bodies...

vulnerabilityCVEcriticalhigh-severitycwe-94
/SCW Vulnerability Desk /CRITICAL /10 /⚑ 2 IOCs /⚙ 3 Sigma