CVE-2021-43444
- EPSS 1.53%
- Veröffentlicht 23.01.2023 15:15:13
- Zuletzt bearbeitet 02.04.2025 16:15:18
ONLYOFFICE all versions as of 2021-11-08 is affected by Incorrect Access Control. Signed document download URLs can be forged due to a weak default URL signing key.
CVE-2021-43445
- EPSS 1.92%
- Veröffentlicht 23.01.2023 15:15:13
- Zuletzt bearbeitet 02.04.2025 16:15:18
ONLYOFFICE all versions as of 2021-11-08 is affected by Incorrect Access Control. An attacker can authenticate with the web socket service of the ONLYOFFICE document editor which is protected by JWT auth by using a default JWT signing key.
CVE-2021-43446
- EPSS 7.34%
- Veröffentlicht 23.01.2023 15:15:13
- Zuletzt bearbeitet 02.04.2025 16:15:18
ONLYOFFICE all versions as of 2021-11-08 is vulnerable to Cross Site Scripting (XSS). The "macros" feature of the document editor allows malicious cross site scripting payloads to be used.
CVE-2021-43447
- EPSS 0.2%
- Veröffentlicht 23.01.2023 15:15:13
- Zuletzt bearbeitet 02.04.2025 16:15:19
ONLYOFFICE all versions as of 2021-11-08 is affected by Incorrect Access Control. An authentication bypass in the document editor allows attackers to edit documents without authentication.
CVE-2021-43448
- EPSS 0.42%
- Veröffentlicht 23.01.2023 15:15:13
- Zuletzt bearbeitet 02.04.2025 16:15:19
ONLYOFFICE all versions as of 2021-11-08 is vulnerable to Improper Input Validation. A lack of input validation can allow an attacker to spoof the names of users who interact with a document, if the document id is known.
CVE-2021-43449
- EPSS 0.75%
- Veröffentlicht 23.01.2023 15:15:13
- Zuletzt bearbeitet 02.04.2025 16:15:19
ONLYOFFICE all versions as of 2021-11-08 is vulnerable to Server-Side Request Forgery (SSRF). The document editor service can be abused to read and serve arbitrary URLs as a document.