CVE-2023-38487
NixOS vulnerability analysis and mitigation

Overview

HedgeDoc, a software for creating real-time collaborative markdown notes, was found to contain a vulnerability (CVE-2023-38487) prior to version 1.9.9. The vulnerability allows users to create notes with an alias matching the ID of existing notes, effectively hiding the original notes. This vulnerability was discovered and disclosed in August 2023, affecting all versions of HedgeDoc up to version 1.9.8 (GitHub Advisory).

Technical details

The vulnerability exists in the API of HedgeDoc 1 when the freeURL feature is enabled (via allowFreeURL config option or CMD_ALLOW_FREEURL environment variable set to true). Users with appropriate permissions can make a POST request to the /new/ API endpoint, where the parameter can be set to match an existing note's ID. The system failed to verify whether the provided value corresponded to a valid ID of an existing note. When accessing the note, HedgeDoc searches for a note with a matching alias before searching by ID, resulting in only the new note being accessible (GitHub Advisory, NVD). The vulnerability has been assigned a CVSS v3.1 base score of 8.2 HIGH by NVD.

Impact

The vulnerability's impact varies depending on the instance's permission settings. Attackers with knowledge of a target note's ID could present manipulated copies of original notes to users, potentially replacing links with malicious ones. Additionally, attackers could prevent access to original notes, causing a denial of service. However, no data loss occurs as the original content remains in the database (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in version 1.9.9 with improved already-exist checks in note creation. For users unable to upgrade, two workarounds are available: 1) Disable freeURL mode to prevent exploitation, or 2) Limit the impact by restricting freeURL note creation to trusted, logged-in users by enabling requireFreeURLAuthentication/CMD_REQUIRE_FREEURL_AUTHENTICATION (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68120MEDIUM5.4
  • NixOSNixOS
  • go
NoYesDec 30, 2025
CVE-2025-69413MEDIUM5.3
  • NixOSNixOS
  • code.gitea.io/gitea
NoYesJan 01, 2026
CVE-2025-15412MEDIUM4.8
  • NixOSNixOS
  • wabt
NoNoJan 01, 2026
CVE-2025-15411MEDIUM4.8
  • NixOSNixOS
  • wabt
NoNoJan 01, 2026
CVE-2025-68932LOW2.9
  • NixOSNixOS
  • freshrss
NoYesDec 27, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management