{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-28276","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-02-26T01:52:58.734Z","datePublished":"2026-02-26T22:57:36.406Z","dateUpdated":"2026-02-27T17:40:15.760Z"},"containers":{"cna":{"title":"Initiative Allows Unauthenticated Access to Uploaded Documents via Public /uploads/ Endpoint","problemTypes":[{"descriptions":[{"cweId":"CWE-200","lang":"en","description":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-284","lang":"en","description":"CWE-284: Improper Access Control","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-862","lang":"en","description":"CWE-862: Missing Authorization","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/Morelitea/initiative/security/advisories/GHSA-w34j-fx72-h2pq","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Morelitea/initiative/security/advisories/GHSA-w34j-fx72-h2pq"},{"name":"https://github.com/Morelitea/initiative/releases/tag/v0.32.2","tags":["x_refsource_MISC"],"url":"https://github.com/Morelitea/initiative/releases/tag/v0.32.2"}],"affected":[{"vendor":"Morelitea","product":"initiative","versions":[{"version":"< 0.32.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-02-26T22:57:36.406Z"},"descriptions":[{"lang":"en","value":"Initiative is a self-hosted project management platform. An access control vulnerability exists in Initiative versions prior to 0.32.2 where uploaded documents are served from a publicly accessible /uploads/ directory without any authentication or authorization checks. Any uploaded file can be accessed directly via its URL by unauthenticated users (e.g., in an incognito browser session), leading to potential disclosure of sensitive documents. The problem was patched in v0.32.2, and the patch was further improved on in 032.4."}],"source":{"advisory":"GHSA-w34j-fx72-h2pq","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-27T17:37:27.019868Z","id":"CVE-2026-28276","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-27T17:40:15.760Z"}}]}}