CVE-2026-3794

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authentication in DoraCMS 3.0.x by exploiting the Email API endpoint /api/v1/mail/send. Attackers can remotely send emails without proper authentication, potentially leading to spam, phishing, or information disclosure. All systems running vulnerable versions of DoraCMS with the Email API exposed are affected.

💻 Affected Systems

Products:
  • doramart DoraCMS
Versions: 3.0.x
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the Email API endpoint accessible. The vulnerability is in the authentication mechanism of the mail sending functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could send malicious emails from the system, enabling phishing campaigns, spam distribution, or data exfiltration through email attachments, potentially damaging reputation and causing regulatory violations.

🟠

Likely Case

Unauthorized email sending leading to spam distribution, potential phishing attacks using the organization's domain, and possible information disclosure through email content.

🟢

If Mitigated

Limited impact with proper network segmentation and API access controls, potentially only affecting isolated test environments.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit is publicly available and can be launched remotely without authentication, making it easy for attackers to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds.

🔧 Temporary Workarounds

Block Email API Endpoint

all

Restrict access to the vulnerable /api/v1/mail/send endpoint using web server configuration or firewall rules.

# For Apache: RewriteRule ^/api/v1/mail/send - [F,L]
# For Nginx: location /api/v1/mail/send { deny all; }

Implement API Authentication

all

Add authentication middleware to the Email API endpoint to require valid credentials before processing requests.

# Modify the API route to include authentication check
# Example: app.post('/api/v1/mail/send', authenticate, sendMail);

🧯 If You Can't Patch

  • Implement network segmentation to isolate the DoraCMS instance from sensitive systems
  • Deploy a Web Application Firewall (WAF) with rules to block unauthorized access to the Email API endpoint

🔍 How to Verify

Check if Vulnerable:

Test if you can send an email via POST request to /api/v1/mail/send without authentication. Use curl: curl -X POST http://[target]/api/v1/mail/send -d '{"to":"test@example.com","subject":"test","body":"test"}'

Check Version:

Check DoraCMS version in admin panel or configuration files. Typically in package.json or similar configuration.

Verify Fix Applied:

After implementing workarounds, verify that unauthorized POST requests to /api/v1/mail/send return authentication errors or are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of POST requests to /api/v1/mail/send from unauthorized IPs
  • Email sending logs showing messages from unauthenticated users

Network Indicators:

  • HTTP POST requests to /api/v1/mail/send without authentication headers
  • Unusual outbound SMTP traffic from the DoraCMS server

SIEM Query:

source="web_server" AND uri_path="/api/v1/mail/send" AND http_method="POST" AND NOT (user_agent="legitimate_client" OR src_ip="trusted_ip")

🔗 References

📤 Share & Export