CVE-2026-41030
Received Received - Intake
Privilege Escalation in ONLYOFFICE Update Service Before

Publication date: 2026-04-16

Last updated on: 2026-04-16

Assigner: MITRE

Description
In ONLYOFFICE DesktopEditors before 9.3.0, the update service allows attackers to perform actions on files with SYSTEM privileges.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-16
Last Modified
2026-04-16
Generated
2026-05-07
AI Q&A
2026-04-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
onlyoffice desktopeditors to 9.3.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-669 The product does not properly transfer a resource/behavior to another sphere, or improperly imports a resource/behavior from another sphere, in a manner that provides unintended control over that resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in ONLYOFFICE DesktopEditors versions before 9.3.0. It involves the update service, which allows attackers to perform actions on files with SYSTEM privileges.


How can this vulnerability impact me? :

Because the update service can be exploited to perform actions with SYSTEM privileges, an attacker could potentially execute unauthorized operations on your system with the highest level of access. This could lead to severe impacts such as system compromise or denial of service.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should update ONLYOFFICE DesktopEditors to version 9.3.0 or later, as the issue is fixed in that release.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in ONLYOFFICE DesktopEditors before version 9.3.0 allows attackers to perform actions on files with SYSTEM privileges via the update service. This could potentially lead to unauthorized access or modification of sensitive data.

However, there is no specific information provided about how this vulnerability directly impacts compliance with standards such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart