CVE-2026-5413
Received Received - Intake
Information Disclosure via ConnectionDetails in Newgen OmniDocs GetWebApiConfiguration

Publication date: 2026-04-02

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was identified in Newgen OmniDocs up to 12.0.00. Affected by this vulnerability is an unknown functionality of the file /omnidocs/GetWebApiConfiguration. The manipulation of the argument connectionDetails leads to information disclosure. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
newgen omnidocs to 12.0.00 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Newgen OmniDocs up to version 12.0.00, specifically involving an unknown functionality of the file /omnidocs/GetWebApiConfiguration. It arises from manipulation of the argument connectionDetails, which leads to information disclosure. The attack can be performed remotely but is considered to have high complexity and is difficult to exploit. Despite this, a public exploit is available.


How can this vulnerability impact me? :

The primary impact of this vulnerability is information disclosure. An attacker who successfully exploits this flaw could gain access to sensitive information through the manipulated connectionDetails argument. Although the attack is difficult to carry out, the availability of a public exploit increases the risk. There is no indication of impact on integrity or availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart