๐Ÿ” CVE Alert

CVE-2026-28506

MEDIUM 4.3

Outline's Information Disclosure in Activity Logs allows User Enumeration of Private Drafts

CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th

Outline is a service that allows for collaborative documentation. Prior to 1.5.0, the events.list API endpoint, used for retrieving activity logs, contains a logic flaw in its filtering mechanism. It allows any authenticated user to retrieve activity events associated with documents that have no collection (e.g., Private Drafts, Deleted Documents), regardless of the user's actual permissions on those documents. While the document content is not directly exposed, this vulnerability leaks sensitive metadata (such as Document IDs, user activity timestamps, and in some specific cases like the Document Title of Permanent Delete). Crucially, leaking valid Document IDs of deleted drafts removes the protection of UUID randomness, making High-severity IDOR attacks (such as the one identified in documents.restore) trivially exploitable by lowering the attack complexity. Version 1.5.0 fixes the issue.

CWE CWE-200
Vendor outline
Product outline
Published Mar 17, 2026
Last Updated Mar 17, 2026
Stay Ahead of the Next One

Get instant alerts for outline outline

Be the first to know when new medium vulnerabilities affecting outline outline are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

outline / outline
< 1.5.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/outline/outline/security/advisories/GHSA-69x7-6fcr-mm6g