Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-25062
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-11 Feb, 2026 | 21:16
Updated At-20 Feb, 2026 | 18:10

Outline is a service that allows for collaborative documentation. Prior to 1.4.0, during the JSON import process, the value of attachments[].key from the imported JSON is passed directly to path.join(rootPath, node.key) and then read using fs.readFile without validation. By embedding path traversal sequences such as ../ or absolute paths, an attacker can read arbitrary files on the server and import them as attachments. This vulnerability is fixed in 1.4.0.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N
CPE Matches

getoutline
getoutline
>>outline>>Versions before 1.4.0(exclusive)
cpe:2.3:a:getoutline:outline:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarysecurity-advisories@github.com
CWE ID: CWE-22
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/outline/outline/releases/tag/v1.4.0security-advisories@github.com
Release Notes
https://github.com/outline/outline/security/advisories/GHSA-7r4f-3wjv-83xfsecurity-advisories@github.com
Vendor Advisory
Exploit
Hyperlink: https://github.com/outline/outline/releases/tag/v1.4.0
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/outline/outline/security/advisories/GHSA-7r4f-3wjv-83xf
Source: security-advisories@github.com
Resource:
Vendor Advisory
Exploit
Change History
0Changes found

Details not found