Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27579: CWE-346: Origin Validation Error in karnop realtime-collaboration-platform

0
High
VulnerabilityCVE-2026-27579cvecve-2026-27579cwe-346cwe-942
Published: Sat Feb 21 2026 (02/21/2026, 10:22:15 UTC)
Source: CVE Database V5
Vendor/Project: karnop
Product: realtime-collaboration-platform

Description

CollabPlatform is a full-stack, real-time doc collaboration platform. In all versions of CollabPlatform, the Appwrite project used by the application is misconfigured to allow arbitrary origins in CORS responses while also permitting credentialed requests. An attacker-controlled domain can issue authenticated cross-origin requests and read sensitive user account information, including email address, account identifiers, and MFA status. The issue did not have a fix at the time of publication.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:43:07 UTC

Technical Analysis

The vulnerability identified as CVE-2026-27579 affects the karnop realtime-collaboration-platform, a full-stack real-time document collaboration tool. The root cause is a misconfiguration in the Appwrite backend service, which improperly allows arbitrary origins in Cross-Origin Resource Sharing (CORS) responses while simultaneously permitting credentialed requests (i.e., requests that include cookies or HTTP authentication). This combination violates secure CORS practices and leads to an origin validation error (CWE-346) and improper access control (CWE-942). As a result, an attacker controlling a malicious domain can craft web pages that perform authenticated cross-origin requests to the vulnerable platform on behalf of logged-in users. Because credentials are included, the attacker can bypass same-origin policy protections and read sensitive user information such as email addresses, account identifiers, and multi-factor authentication (MFA) status. The vulnerability does not allow modification or deletion of data (no integrity or availability impact) but causes a significant confidentiality breach. Exploitation requires user interaction (visiting a malicious site) but no prior authentication or elevated privileges. The issue affects all versions up to the current master branch, and no patch or fix was available at the time of publication. The CVSS v3.1 base score is 7.4, reflecting network attack vector, low attack complexity, no privileges required, user interaction required, scope change, and high confidentiality impact. No known exploits have been reported in the wild yet. This vulnerability highlights the critical importance of strict origin validation and cautious use of credentialed CORS requests in web applications, especially those handling sensitive user data in collaborative environments.

Potential Impact

The primary impact of CVE-2026-27579 is the unauthorized disclosure of sensitive user information, including email addresses, account identifiers, and MFA status. This data leakage can facilitate targeted phishing, social engineering, and account takeover attempts. Organizations using the vulnerable collaboration platform risk exposure of their users' personal and security-related information, potentially undermining trust and compliance with data protection regulations such as GDPR. Although the vulnerability does not allow data modification or service disruption, the confidentiality breach alone can have severe reputational and operational consequences. Attackers can exploit this flaw remotely over the network with minimal complexity, requiring only that users visit a malicious website. The scope of affected systems is broad, as all versions up to the current master branch are vulnerable. The lack of a patch increases the window of exposure. Enterprises relying on real-time collaboration tools for sensitive projects or regulated data are particularly at risk. Additionally, attackers may chain this vulnerability with other exploits to escalate attacks or gain further access.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit and restrict the CORS configuration in the Appwrite backend and the realtime-collaboration-platform. Specifically, they must: 1) Remove the wildcard or arbitrary origin allowance in CORS headers and explicitly specify trusted origins only. 2) Disable credentialed CORS requests (i.e., do not set Access-Control-Allow-Credentials to true) unless absolutely necessary and only for trusted origins. 3) Implement strict origin validation logic server-side to ensure requests originate from authorized domains. 4) Employ Content Security Policy (CSP) headers to limit the domains that can execute scripts or embed the application. 5) Educate users to avoid visiting untrusted or suspicious websites while logged into the platform. 6) Monitor network traffic and logs for anomalous cross-origin requests or unusual data access patterns. 7) Follow the vendor’s updates closely and apply patches promptly once available. 8) Consider deploying Web Application Firewalls (WAFs) with rules to detect and block suspicious CORS misuse. These steps go beyond generic advice by focusing on precise CORS policy hardening and proactive monitoring tailored to this vulnerability’s exploitation vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T17:40:28.449Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699989acbe58cf853b7b329e

Added to database: 2/21/2026, 10:32:12 AM

Last enriched: 2/28/2026, 12:43:07 PM

Last updated: 4/7/2026, 2:54:55 PM

Views: 158

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses