Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative

0
High
VulnerabilityCVE-2026-28276cvecve-2026-28276cwe-200cwe-284cwe-862
Published: Thu Feb 26 2026 (02/26/2026, 22:57:36 UTC)
Source: CVE Database V5
Vendor/Project: Morelitea
Product: initiative

Description

Initiative is a self-hosted project management platform. An access control vulnerability exists in Initiative versions prior to 0.32.2 where uploaded documents are served from a publicly accessible /uploads/ directory without any authentication or authorization checks. Any uploaded file can be accessed directly via its URL by unauthenticated users (e.g., in an incognito browser session), leading to potential disclosure of sensitive documents. The problem was patched in v0.32.2, and the patch was further improved on in 032.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:25:35 UTC

Technical Analysis

The vulnerability CVE-2026-28276 affects the Morelitea Initiative, a self-hosted project management platform, in versions prior to 0.32.2. The root cause is an access control weakness where uploaded documents are stored in a web-accessible /uploads/ directory without any authentication or authorization enforcement. This means that any file uploaded to the platform can be accessed directly by anyone who knows or can guess the URL, including unauthenticated users such as those browsing in incognito mode. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information), CWE-284 (Improper Access Control), and CWE-862 (Missing Authorization), indicating multiple layers of access control failures. The exposure of sensitive documents can lead to unauthorized disclosure of confidential project data, intellectual property, or personal information. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting high severity due to its ease of exploitation (network accessible, no privileges or user interaction required) and the high impact on confidentiality. The issue was addressed in version 0.32.2, which introduced authentication and authorization checks for accessing uploaded files, with further improvements in 0.32.4 to enhance security. No known exploits have been reported in the wild as of the publication date, but the vulnerability presents a clear risk to organizations using affected versions of the software.

Potential Impact

Organizations using vulnerable versions of the Morelitea Initiative platform risk unauthorized disclosure of sensitive documents uploaded to the system. This can lead to exposure of confidential business information, project plans, intellectual property, or personal data, potentially resulting in reputational damage, regulatory non-compliance, and financial losses. Since the vulnerability requires no authentication or user interaction, attackers can easily access sensitive files remotely, increasing the attack surface. The impact is primarily on confidentiality, with no direct effect on integrity or availability. However, the exposure of sensitive information can facilitate further attacks such as social engineering, corporate espionage, or targeted phishing campaigns. Organizations relying on Initiative for project management and document sharing should consider this vulnerability critical to their data protection posture.

Mitigation Recommendations

1. Immediately upgrade the Morelitea Initiative platform to version 0.32.2 or later, preferably 0.32.4, to apply the official patches that enforce proper authentication and authorization on uploaded files. 2. If immediate upgrade is not possible, restrict access to the /uploads/ directory at the web server or reverse proxy level by implementing IP whitelisting, authentication gateways, or network segmentation to limit exposure. 3. Review and audit all uploaded documents to identify any sensitive information that may have been exposed and take appropriate incident response actions. 4. Implement logging and monitoring for access to the /uploads/ directory to detect any unauthorized access attempts. 5. Educate users and administrators about secure file handling practices and the importance of applying software updates promptly. 6. Consider deploying web application firewalls (WAFs) with rules to block unauthorized access to upload directories. 7. Regularly perform security assessments and penetration testing on the platform to identify and remediate similar access control weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T01:52:58.734Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0d31032ffcdb8a2667dfb

Added to database: 2/26/2026, 11:11:12 PM

Last enriched: 2/26/2026, 11:25:35 PM

Last updated: 4/12/2026, 9:34:40 AM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses