Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5413: Information Disclosure in Newgen OmniDocs

0
Medium
VulnerabilityCVE-2026-5413cvecve-2026-5413
Published: Thu Apr 02 2026 (04/02/2026, 17:45:09 UTC)
Source: CVE Database V5
Vendor/Project: Newgen
Product: OmniDocs

Description

A vulnerability was identified in Newgen OmniDocs up to 12.0.00. Affected by this vulnerability is an unknown functionality of the file /omnidocs/GetWebApiConfiguration. The manipulation of the argument connectionDetails leads to information disclosure. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 18:24:14 UTC

Technical Analysis

CVE-2026-5413 is a medium-severity vulnerability identified in Newgen OmniDocs up to version 12.0.00. The flaw resides in an unspecified functionality accessible through the /omnidocs/GetWebApiConfiguration endpoint, where the manipulation of the connectionDetails parameter leads to unauthorized information disclosure. This vulnerability can be exploited remotely without requiring authentication or user interaction, increasing its risk profile. However, the attack complexity is high, making exploitation difficult. The vulnerability allows attackers to retrieve sensitive configuration or connection details that could facilitate further attacks or data breaches. Despite the availability of a public exploit, no confirmed active exploitation has been reported. The vendor was notified early but has not issued any response or patch, leaving affected systems exposed. The CVSS 4.0 vector (AV:N/AC:H/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) reflects a network attack vector with high complexity and low impact on confidentiality, no impact on integrity or availability, and no privileges or user interaction required. This vulnerability highlights the need for organizations to monitor and secure their OmniDocs deployments, especially those exposing the vulnerable endpoint externally.

Potential Impact

The primary impact of CVE-2026-5413 is unauthorized disclosure of sensitive information from OmniDocs systems. This could include configuration details, connection strings, or other internal data that attackers can leverage to escalate privileges, move laterally within networks, or conduct further targeted attacks. While the vulnerability does not directly affect data integrity or availability, the information gained could facilitate more severe compromises. Organizations relying on OmniDocs for document management and workflow automation may face increased risk of data breaches, regulatory non-compliance, and reputational damage. The high complexity reduces the likelihood of widespread exploitation, but the presence of a public exploit and lack of vendor response increase the urgency for mitigation. Enterprises with externally accessible OmniDocs instances are particularly vulnerable to remote reconnaissance and information gathering by threat actors.

Mitigation Recommendations

Given the absence of an official patch or vendor response, organizations should implement compensating controls to mitigate CVE-2026-5413. First, restrict external access to the /omnidocs/GetWebApiConfiguration endpoint using network segmentation, firewalls, or web application firewalls (WAFs) to limit exposure to trusted internal users only. Employ strict access controls and monitor logs for unusual requests targeting this endpoint or suspicious manipulation of the connectionDetails parameter. Conduct thorough audits of OmniDocs configurations to identify and minimize sensitive information exposure. If possible, disable or restrict the vulnerable functionality until a vendor patch is available. Additionally, implement intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts. Maintain up-to-date backups and incident response plans in case of compromise. Finally, engage with Newgen support channels regularly to track any forthcoming patches or advisories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-04-02T08:02:10.455Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ceb0a7e6bfc5ba1df381f3

Added to database: 4/2/2026, 6:08:39 PM

Last enriched: 4/2/2026, 6:24:14 PM

Last updated: 4/6/2026, 2:36:10 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses