Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3794: Improper Authentication in doramart DoraCMS

0
Medium
VulnerabilityCVE-2026-3794cvecve-2026-3794
Published: Mon Mar 09 2026 (03/09/2026, 01:32:10 UTC)
Source: CVE Database V5
Vendor/Project: doramart
Product: DoraCMS

Description

A vulnerability was identified in doramart DoraCMS 3.0.x. This issue affects some unknown processing of the file /api/v1/mail/send of the component Email API. Such manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 03/09/2026, 02:37:17 UTC

Technical Analysis

CVE-2026-3794 is a security vulnerability identified in doramart DoraCMS version 3.0.x, specifically within the Email API component that processes requests to the /api/v1/mail/send endpoint. The vulnerability arises from improper authentication handling, allowing remote attackers to bypass authentication mechanisms and interact with the email sending functionality without valid credentials or user interaction. This flaw could enable attackers to send emails on behalf of the application or perform other unauthorized actions related to the email API, potentially facilitating phishing, spam campaigns, or further exploitation within the compromised environment. The vulnerability is remotely exploitable over the network without requiring privileges or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects a medium severity rating with partial impacts on confidentiality, integrity, and availability. The vendor has not responded to disclosure attempts, and no official patches or mitigations have been released. Although no active exploitation in the wild is currently documented, a public exploit is available, raising the urgency for affected organizations to implement mitigations. The vulnerability affects all deployments of DoraCMS 3.0.x that expose the vulnerable Email API endpoint, which is commonly used in web content management scenarios.

Potential Impact

The improper authentication vulnerability in DoraCMS 3.0.x can have significant impacts on organizations using this CMS. Attackers exploiting this flaw can remotely bypass authentication controls and abuse the email sending functionality, potentially leading to unauthorized email dispatches that could be used for phishing, spam, or social engineering attacks targeting employees or customers. This can damage organizational reputation, lead to data leakage if sensitive information is included in emails, and facilitate further network intrusion or lateral movement. Additionally, unauthorized use of the email API may result in service disruption or resource exhaustion, impacting availability. Since the vulnerability does not require authentication or user interaction, it can be exploited at scale by automated tools, increasing the risk of widespread abuse. Organizations relying on DoraCMS 3.0.x for public-facing websites or internal portals are particularly at risk. The lack of vendor response and patches further exacerbates the threat, leaving systems exposed until mitigations are applied or upgrades performed.

Mitigation Recommendations

Given the absence of official patches or vendor guidance, organizations should implement several specific mitigations to reduce risk. First, restrict access to the /api/v1/mail/send endpoint by implementing network-level controls such as IP whitelisting or VPN-only access to limit exposure. Second, deploy web application firewalls (WAFs) with custom rules to detect and block unauthorized requests targeting the email API endpoint, focusing on anomalous or unauthenticated access patterns. Third, review and harden the CMS configuration to disable or restrict email API functionality if not essential. Fourth, monitor application logs and network traffic for suspicious activity related to the email API, including unexpected outbound emails or repeated access attempts. Fifth, consider upgrading to a later DoraCMS version if available or migrating to alternative CMS platforms with active security support. Finally, educate security teams and administrators about this vulnerability and maintain heightened vigilance until an official patch is released. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-08T07:31:54.271Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ae2ef52904315ca3454d30

Added to database: 3/9/2026, 2:22:45 AM

Last enriched: 3/9/2026, 2:37:17 AM

Last updated: 3/12/2026, 8:13:52 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses