CVE-2026-33640
Brute Force Vulnerability in Outline Email OTP Enables Account Takeover
Publication date: 2026-03-26
Last updated on: 2026-03-31
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| getoutline | outline | From 0.86.0 (inc) to 1.6.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-307 | The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-33640 is a critical vulnerability in the Outline software's Email One-Time Password (OTP) login flow for users not linked to an Identity Provider, affecting versions 0.86.0 to 1.6.0.
The vulnerability exists because Outline does not invalidate OTP codes based on the number or frequency of invalid submissions. Instead, it relies solely on a rate limiter configured to allow 5 requests per minute to the OTP submission endpoint.
Attackers can bypass this rate limiter by forging JWT tokens with arbitrary UUIDs or spoofing the X-Forwarded-For HTTP header, allowing unlimited OTP submission attempts within the 10-minute OTP code lifetime.
This enables brute force attacks on OTP codes, potentially leading to account takeover for users not associated with an Identity Provider, assuming the attacker knows the target's email address.
How can this vulnerability impact me? :
This vulnerability allows attackers to perform brute force attacks on the Email OTP login mechanism, bypassing rate limits and submitting unlimited OTP attempts within the code's 10-minute validity.
Successful exploitation can lead to account takeover without requiring any privileges or user interaction, compromising the confidentiality and integrity of user accounts.
The attack complexity is low, and the attack vector is network-based, making it feasible for remote attackers to exploit this vulnerability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring unusual or excessive OTP submission attempts to the /auth/email.callback endpoint, especially if the rate limiter is being bypassed.
Detection methods include checking logs for high-frequency OTP validation requests from the same or spoofed sources, and verifying if JWT cookies are being forged or if the X-Forwarded-For header is being manipulated.
Suggested commands to detect suspicious activity might include:
- Using web server or application logs to filter requests to /auth/email.callback and count the number of attempts per IP or per JWT 'id' claim.
- Example using grep and awk on logs: `grep '/auth/email.callback' access.log | awk '{print $1}' | sort | uniq -c | sort -nr` to identify IPs with high request counts.
- Inspect HTTP headers for suspicious X-Forwarded-For values that might indicate spoofing.
- Analyze JWT cookies in requests to check for invalid or forged UUIDs in the 'id' claim.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Upgrade Outline to version 1.6.0 or later, where the vulnerability is fixed.
- Implement stricter rate limiting on the /auth/email.callback endpoint, ensuring it cannot be bypassed by JWT forging or X-Forwarded-For header spoofing.
- Invalidate OTP codes after a limited number of failed attempts (e.g., after 5 failures).
- Reduce the OTP time-to-live (TTL) or rotate OTP codes upon failure to limit the window for brute forcing.
- Enable alerting and logging for patterns indicative of brute force attacks.
- Enforce account lockout or exponential backoff mechanisms after multiple invalid OTP submissions.
- Ensure reverse proxies are correctly configured to prevent X-Forwarded-For header spoofing.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
CVE-2026-33640 allows attackers to perform brute force attacks on the Email OTP login mechanism, potentially leading to account takeover without requiring privileged access or user interaction.
Such unauthorized account access could result in exposure or misuse of personal or sensitive data, which may violate data protection requirements under standards like GDPR or HIPAA.
The vulnerability's impact on confidentiality and integrity is rated high, indicating a significant risk to protected information that these regulations aim to safeguard.
Therefore, organizations using affected versions of Outline may face compliance challenges if this vulnerability is exploited, as it undermines secure authentication controls required by these standards.