CVE-2026-3794: Improper Authentication in doramart DoraCMS
A vulnerability was identified in doramart DoraCMS 3.0.x. This issue affects some unknown processing of the file /api/v1/mail/send of the component Email API. Such manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-3794 is a security vulnerability identified in doramart DoraCMS version 3.0.x, specifically within the Email API component that processes requests to the /api/v1/mail/send endpoint. The vulnerability arises from improper authentication handling, allowing remote attackers to bypass authentication mechanisms and interact with the email sending functionality without valid credentials or user interaction. This flaw could enable attackers to send emails on behalf of the application or perform other unauthorized actions related to the email API, potentially facilitating phishing, spam campaigns, or further exploitation within the compromised environment. The vulnerability is remotely exploitable over the network without requiring privileges or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects a medium severity rating with partial impacts on confidentiality, integrity, and availability. The vendor has not responded to disclosure attempts, and no official patches or mitigations have been released. Although no active exploitation in the wild is currently documented, a public exploit is available, raising the urgency for affected organizations to implement mitigations. The vulnerability affects all deployments of DoraCMS 3.0.x that expose the vulnerable Email API endpoint, which is commonly used in web content management scenarios.
Potential Impact
The improper authentication vulnerability in DoraCMS 3.0.x can have significant impacts on organizations using this CMS. Attackers exploiting this flaw can remotely bypass authentication controls and abuse the email sending functionality, potentially leading to unauthorized email dispatches that could be used for phishing, spam, or social engineering attacks targeting employees or customers. This can damage organizational reputation, lead to data leakage if sensitive information is included in emails, and facilitate further network intrusion or lateral movement. Additionally, unauthorized use of the email API may result in service disruption or resource exhaustion, impacting availability. Since the vulnerability does not require authentication or user interaction, it can be exploited at scale by automated tools, increasing the risk of widespread abuse. Organizations relying on DoraCMS 3.0.x for public-facing websites or internal portals are particularly at risk. The lack of vendor response and patches further exacerbates the threat, leaving systems exposed until mitigations are applied or upgrades performed.
Mitigation Recommendations
Given the absence of official patches or vendor guidance, organizations should implement several specific mitigations to reduce risk. First, restrict access to the /api/v1/mail/send endpoint by implementing network-level controls such as IP whitelisting or VPN-only access to limit exposure. Second, deploy web application firewalls (WAFs) with custom rules to detect and block unauthorized requests targeting the email API endpoint, focusing on anomalous or unauthenticated access patterns. Third, review and harden the CMS configuration to disable or restrict email API functionality if not essential. Fourth, monitor application logs and network traffic for suspicious activity related to the email API, including unexpected outbound emails or repeated access attempts. Fifth, consider upgrading to a later DoraCMS version if available or migrating to alternative CMS platforms with active security support. Finally, educate security teams and administrators about this vulnerability and maintain heightened vigilance until an official patch is released. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vector.
Affected Countries
United States, China, India, Germany, United Kingdom, Brazil, Russia, France, Japan, South Korea
CVE-2026-3794: Improper Authentication in doramart DoraCMS
Description
A vulnerability was identified in doramart DoraCMS 3.0.x. This issue affects some unknown processing of the file /api/v1/mail/send of the component Email API. Such manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2026-3794 is a security vulnerability identified in doramart DoraCMS version 3.0.x, specifically within the Email API component that processes requests to the /api/v1/mail/send endpoint. The vulnerability arises from improper authentication handling, allowing remote attackers to bypass authentication mechanisms and interact with the email sending functionality without valid credentials or user interaction. This flaw could enable attackers to send emails on behalf of the application or perform other unauthorized actions related to the email API, potentially facilitating phishing, spam campaigns, or further exploitation within the compromised environment. The vulnerability is remotely exploitable over the network without requiring privileges or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects a medium severity rating with partial impacts on confidentiality, integrity, and availability. The vendor has not responded to disclosure attempts, and no official patches or mitigations have been released. Although no active exploitation in the wild is currently documented, a public exploit is available, raising the urgency for affected organizations to implement mitigations. The vulnerability affects all deployments of DoraCMS 3.0.x that expose the vulnerable Email API endpoint, which is commonly used in web content management scenarios.
Potential Impact
The improper authentication vulnerability in DoraCMS 3.0.x can have significant impacts on organizations using this CMS. Attackers exploiting this flaw can remotely bypass authentication controls and abuse the email sending functionality, potentially leading to unauthorized email dispatches that could be used for phishing, spam, or social engineering attacks targeting employees or customers. This can damage organizational reputation, lead to data leakage if sensitive information is included in emails, and facilitate further network intrusion or lateral movement. Additionally, unauthorized use of the email API may result in service disruption or resource exhaustion, impacting availability. Since the vulnerability does not require authentication or user interaction, it can be exploited at scale by automated tools, increasing the risk of widespread abuse. Organizations relying on DoraCMS 3.0.x for public-facing websites or internal portals are particularly at risk. The lack of vendor response and patches further exacerbates the threat, leaving systems exposed until mitigations are applied or upgrades performed.
Mitigation Recommendations
Given the absence of official patches or vendor guidance, organizations should implement several specific mitigations to reduce risk. First, restrict access to the /api/v1/mail/send endpoint by implementing network-level controls such as IP whitelisting or VPN-only access to limit exposure. Second, deploy web application firewalls (WAFs) with custom rules to detect and block unauthorized requests targeting the email API endpoint, focusing on anomalous or unauthenticated access patterns. Third, review and harden the CMS configuration to disable or restrict email API functionality if not essential. Fourth, monitor application logs and network traffic for suspicious activity related to the email API, including unexpected outbound emails or repeated access attempts. Fifth, consider upgrading to a later DoraCMS version if available or migrating to alternative CMS platforms with active security support. Finally, educate security teams and administrators about this vulnerability and maintain heightened vigilance until an official patch is released. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vector.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-08T07:31:54.271Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69ae2ef52904315ca3454d30
Added to database: 3/9/2026, 2:22:45 AM
Last enriched: 3/9/2026, 2:37:17 AM
Last updated: 3/12/2026, 8:13:52 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.