Outline Insecure Direct Object Reference (CVE-2026-41649) Exposes Documents
The National Vulnerability Database (NVD) highlights CVE-2026-41649, a high-severity Insecure Direct Object Reference (IDOR) vulnerability in Outline, a collaborative documentation service. This flaw, present in versions 0.86.0 through 1.6.x, allows an authenticated attacker to generate valid public share links for any document on the platform, regardless of workspace ownership.
The vulnerability stems from a logical flaw in the shares.create API endpoint. When a request includes both collectionId and documentId, Outline’s authorization logic only verifies access to the collection, completely ignoring the specified document. This bypass enables an attacker to craft a public share for sensitive documents they shouldn’t have access to, subsequently retrieving the full document contents via the documents.info endpoint. A patch is available in version 1.7.0.
This isn’t just a theoretical issue; it’s a direct path to data exposure. Organizations using affected Outline versions face a critical risk of unauthorized disclosure of confidential information. Attackers don’t need elevated privileges, just a valid account, to start exfiltrating data across workspaces. The CVSS score of 7.7 (HIGH) reflects the significant impact on confidentiality.
What This Means For You
- If your organization utilizes Outline for documentation, you must immediately verify your version. If you are running any version between 0.86.0 and 1.6.x, you are vulnerable. Prioritize upgrading to Outline version 1.7.0 or later to patch CVE-2026-41649. Audit public share links and document access logs for any suspicious activity indicating unauthorized sharing.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-41649 - Outline Insecure Direct Object Reference for Document Access
title: CVE-2026-41649 - Outline Insecure Direct Object Reference for Document Access
id: scw-2026-04-28-ai-1
status: experimental
level: high
description: |
Detects the specific API call pattern for CVE-2026-41649 where an attacker crafts a request to the `shares.create` endpoint with both `collectionId` and `documentId` parameters. This bypasses authorization checks and allows the creation of a public share link for any document, enabling unauthorized access.
author: SCW Feed Engine (AI-generated)
date: 2026-04-28
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-41649/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/api/v1/shares.create'
cs-method:
- 'POST'
cs-uri-query|contains:
- 'collectionId='
- 'documentId='
selection_base:
sc-status:
- '200'
condition: selection AND selection_base
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41649 | IDOR | Outline service, versions 0.86.0 to 1.6.x |
| CVE-2026-41649 | IDOR | Outline API endpoint: shares.create |
| CVE-2026-41649 | Information Disclosure | Outline API endpoint: documents.info |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 29, 2026 at 01:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.