CVE-2026-41030
Privilege Escalation in ONLYOFFICE Update Service Before
Publication date: 2026-04-16
Last updated on: 2026-04-16
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| onlyoffice | desktopeditors | to 9.3.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-669 | The product does not properly transfer a resource/behavior to another sphere, or improperly imports a resource/behavior from another sphere, in a manner that provides unintended control over that resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in ONLYOFFICE DesktopEditors versions before 9.3.0. It involves the update service, which allows attackers to perform actions on files with SYSTEM privileges.
How can this vulnerability impact me? :
Because the update service can be exploited to perform actions with SYSTEM privileges, an attacker could potentially execute unauthorized operations on your system with the highest level of access. This could lead to severe impacts such as system compromise or denial of service.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update ONLYOFFICE DesktopEditors to version 9.3.0 or later, as the issue is fixed in that release.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in ONLYOFFICE DesktopEditors before version 9.3.0 allows attackers to perform actions on files with SYSTEM privileges via the update service. This could potentially lead to unauthorized access or modification of sensitive data.
However, there is no specific information provided about how this vulnerability directly impacts compliance with standards such as GDPR or HIPAA.