CVE-2022-24837
NixOS vulnerability analysis and mitigation

Overview

HedgeDoc, an open-source, web-based, self-hosted, collaborative markdown editor, was found to have a vulnerability in versions 1.9.1 and later (prior to 1.9.3). The vulnerability (CVE-2022-24837) involves enumerable filenames after image uploads, which could potentially lead to information leakage of uploaded documents. This issue particularly affects private notes and impacts all upload backends except Lutim and imgur (GitHub Advisory).

Technical details

The vulnerability stems from a change in behavior between versions 1 and 2 of the formidable package, which HedgeDoc uses for file uploads. In version 2, formidable generates predictable filenames by default, making uploaded files enumerable. Files generated during the vulnerable period follow a predictable pattern (e.g., 38e56506ec2dcab52e9282c00.jpg, 38e56506ec2dcab52e9282c01.jpg). The vulnerability has been assigned a CVSS v3.1 base score of 5.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (GitHub Advisory, NVD).

Impact

The vulnerability could lead to unauthorized access to uploaded documents, particularly affecting private notes. The predictable nature of the filenames makes it possible for attackers to enumerate and potentially access uploaded files, compromising the confidentiality of sensitive information (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in HedgeDoc version 1.9.3 by replacing the filename generation with UUIDv4, resulting in unpredictable filenames (e.g., a67f36b8-9afb-43c2-9ef2-a567a77d8628.jpg). For users unable to upgrade to version 1.9.3, a workaround is available by blocking POST requests to /uploadimage, which will disable future uploads (GitHub Advisory, GitHub Commit).

Community reactions

The vulnerability was responsibly disclosed by Matias from NCSC-FI (National Cyber Security Centre Finland), demonstrating effective collaboration between security researchers and the open-source community (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22783HIGH8.1
  • NixOSNixOS
  • iris
NoYesJan 12, 2026
CVE-2026-0821MEDIUM6.9
  • NixOSNixOS
  • quickjs
NoNoJan 10, 2026
CVE-2025-68949MEDIUM5.3
  • NixOSNixOS
  • n8n
NoYesJan 13, 2026
CVE-2026-22784LOW2.3
  • NixOSNixOS
  • lychee
NoYesJan 12, 2026
CVE-2026-23497LOW1.3
  • NixOSNixOS
  • learning
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management