CVE-2026-5413
Information Disclosure via ConnectionDetails in Newgen OmniDocs GetWebApiConfiguration
Publication date: 2026-04-02
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| newgen | omnidocs | to 12.0.00 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Newgen OmniDocs up to version 12.0.00, specifically involving an unknown functionality of the file /omnidocs/GetWebApiConfiguration. It arises from manipulation of the argument connectionDetails, which leads to information disclosure. The attack can be performed remotely but is considered to have high complexity and is difficult to exploit. Despite this, a public exploit is available.
How can this vulnerability impact me? :
The primary impact of this vulnerability is information disclosure. An attacker who successfully exploits this flaw could gain access to sensitive information through the manipulated connectionDetails argument. Although the attack is difficult to carry out, the availability of a public exploit increases the risk. There is no indication of impact on integrity or availability.