CVE-2026-33284: CWE-20: Improper Input Validation in globaleaks globaleaks-whistleblowing-software
GlobaLeaks is free and open-source whistleblowing software. Prior to version 5.0.89, the /api/support endpoint of GlobaLeaks performs minimal validation on user-submitted support requests. As a result, arbitrary URLs can be included in support emails sent to administrators. Version 5.0.89 patches the issue.
AI Analysis
Technical Summary
GlobaLeaks is an open-source platform designed to facilitate secure whistleblowing. Prior to version 5.0.89, the software's /api/support endpoint inadequately validated user input submitted through support requests. Specifically, it allowed arbitrary URLs to be embedded within support emails sent to system administrators. This improper input validation (CWE-20) could be exploited by an attacker to insert malicious or misleading URLs into emails, potentially leading to phishing, social engineering, or redirection to malicious sites. The vulnerability does not require any privileges or authentication to exploit, but does require user interaction to submit the support request. The CVSS 4.0 vector indicates network attack vector, low complexity, no privileges required, user interaction needed, and low impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild. The vendor addressed the issue in version 5.0.89 by implementing stricter validation of URLs in support requests, preventing arbitrary URL injection. This vulnerability primarily affects organizations using GlobaLeaks versions earlier than 5.0.89, especially those relying on the support request feature for communication with administrators.
Potential Impact
The primary impact of this vulnerability is the potential for phishing or social engineering attacks targeting administrators who receive support emails containing attacker-controlled URLs. If an administrator clicks on a malicious link, it could lead to credential theft, malware infection, or redirection to harmful websites. However, the vulnerability does not directly compromise the confidentiality, integrity, or availability of the GlobaLeaks system itself. The low CVSS score reflects the limited scope and impact. Nonetheless, given that GlobaLeaks is used for whistleblowing, any compromise of trust or security in communication channels could undermine the platform's integrity and user confidence. Organizations relying on GlobaLeaks for sensitive whistleblowing reports could face reputational damage if attackers exploit this vulnerability to deceive administrators or disrupt support processes.
Mitigation Recommendations
Organizations should upgrade GlobaLeaks to version 5.0.89 or later, where the vulnerability is patched. Until upgrading, administrators should implement strict email filtering and URL scanning on incoming support emails to detect and block suspicious or unexpected URLs. Training administrators to recognize phishing attempts and suspicious links in support communications is critical. Additionally, consider isolating or sandboxing email clients used to read support requests to limit potential damage from malicious links. Monitoring logs for unusual support request activity or repeated URL submissions can help detect exploitation attempts. If possible, disable or restrict the /api/support endpoint temporarily until the patch is applied. Finally, maintain a robust incident response plan to address any phishing or social engineering incidents stemming from this vulnerability.
Affected Countries
United States, Germany, United Kingdom, France, Italy, Canada, Australia, Netherlands, Sweden, Norway
CVE-2026-33284: CWE-20: Improper Input Validation in globaleaks globaleaks-whistleblowing-software
Description
GlobaLeaks is free and open-source whistleblowing software. Prior to version 5.0.89, the /api/support endpoint of GlobaLeaks performs minimal validation on user-submitted support requests. As a result, arbitrary URLs can be included in support emails sent to administrators. Version 5.0.89 patches the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
GlobaLeaks is an open-source platform designed to facilitate secure whistleblowing. Prior to version 5.0.89, the software's /api/support endpoint inadequately validated user input submitted through support requests. Specifically, it allowed arbitrary URLs to be embedded within support emails sent to system administrators. This improper input validation (CWE-20) could be exploited by an attacker to insert malicious or misleading URLs into emails, potentially leading to phishing, social engineering, or redirection to malicious sites. The vulnerability does not require any privileges or authentication to exploit, but does require user interaction to submit the support request. The CVSS 4.0 vector indicates network attack vector, low complexity, no privileges required, user interaction needed, and low impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild. The vendor addressed the issue in version 5.0.89 by implementing stricter validation of URLs in support requests, preventing arbitrary URL injection. This vulnerability primarily affects organizations using GlobaLeaks versions earlier than 5.0.89, especially those relying on the support request feature for communication with administrators.
Potential Impact
The primary impact of this vulnerability is the potential for phishing or social engineering attacks targeting administrators who receive support emails containing attacker-controlled URLs. If an administrator clicks on a malicious link, it could lead to credential theft, malware infection, or redirection to harmful websites. However, the vulnerability does not directly compromise the confidentiality, integrity, or availability of the GlobaLeaks system itself. The low CVSS score reflects the limited scope and impact. Nonetheless, given that GlobaLeaks is used for whistleblowing, any compromise of trust or security in communication channels could undermine the platform's integrity and user confidence. Organizations relying on GlobaLeaks for sensitive whistleblowing reports could face reputational damage if attackers exploit this vulnerability to deceive administrators or disrupt support processes.
Mitigation Recommendations
Organizations should upgrade GlobaLeaks to version 5.0.89 or later, where the vulnerability is patched. Until upgrading, administrators should implement strict email filtering and URL scanning on incoming support emails to detect and block suspicious or unexpected URLs. Training administrators to recognize phishing attempts and suspicious links in support communications is critical. Additionally, consider isolating or sandboxing email clients used to read support requests to limit potential damage from malicious links. Monitoring logs for unusual support request activity or repeated URL submissions can help detect exploitation attempts. If possible, disable or restrict the /api/support endpoint temporarily until the patch is applied. Finally, maintain a robust incident response plan to address any phishing or social engineering incidents stemming from this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-18T18:55:47.425Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c694993c064ed76fb5b681
Added to database: 3/27/2026, 2:30:49 PM
Last enriched: 3/27/2026, 2:48:47 PM
Last updated: 3/28/2026, 1:43:39 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.