getoutline CVE Vulnerabilities & Metrics

Focus on getoutline vulnerabilities and metrics.

Last updated: 29 Mar 2026, 22:25 UTC

About getoutline Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with getoutline. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total getoutline CVEs: 12
Earliest CVE date: 07 Jul 2022, 10:15 UTC
Latest CVE date: 17 Mar 2026, 16:16 UTC

Latest CVE reference: CVE-2026-28506

Rolling Stats

30-day Count (Rolling): 2
365-day Count (Rolling): 7

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -33.33%
Year Variation (Calendar): 133.33%

Month Growth Rate (30-day Rolling): -33.33%
Year Growth Rate (365-day Rolling): 133.33%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical getoutline CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 0.29

Max CVSS: 3.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 12
4.0-6.9 0
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS getoutline CVEs

These are the five CVEs with the highest CVSS scores for getoutline, sorted by severity first and recency.

All CVEs for getoutline

CVE-2026-28506 getoutline vulnerability CVSS: 0 17 Mar 2026, 16:16 UTC

Outline is a service that allows for collaborative documentation. Prior to 1.5.0, the events.list API endpoint, used for retrieving activity logs, contains a logic flaw in its filtering mechanism. It allows any authenticated user to retrieve activity events associated with documents that have no collection (e.g., Private Drafts, Deleted Documents), regardless of the user's actual permissions on those documents. While the document content is not directly exposed, this vulnerability leaks sensitive metadata (such as Document IDs, user activity timestamps, and in some specific cases like the Document Title of Permanent Delete). Crucially, leaking valid Document IDs of deleted drafts removes the protection of UUID randomness, making High-severity IDOR attacks (such as the one identified in documents.restore) trivially exploitable by lowering the attack complexity. Version 1.5.0 fixes the issue.

CVE-2026-24901 getoutline vulnerability CVSS: 0 17 Mar 2026, 16:16 UTC

Outline is a service that allows for collaborative documentation. Prior to 1.4.0, an Insecure Direct Object Reference (IDOR) vulnerability in the document restoration logic allows any team member to unauthorizedly restore, view, and seize ownership of deleted drafts belonging to other users, including administrators. By bypassing ownership validation during the restore process, an attacker can access sensitive private information and effectively lock the original owner out of their own content. Version 1.4.0 fixes the issue.

CVE-2026-25062 getoutline vulnerability CVSS: 0 11 Feb 2026, 21:16 UTC

Outline is a service that allows for collaborative documentation. Prior to 1.4.0, during the JSON import process, the value of attachments[].key from the imported JSON is passed directly to path.join(rootPath, node.key) and then read using fs.readFile without validation. By embedding path traversal sequences such as ../ or absolute paths, an attacker can read arbitrary files on the server and import them as attachments. This vulnerability is fixed in 1.4.0.

CVE-2025-68663 getoutline vulnerability CVSS: 0 11 Feb 2026, 21:16 UTC

Outline is a service that allows for collaborative documentation. Prior to 1.1.0, a vulnerability was found in Outline's WebSocket authentication mechanism that allows suspended users to maintain or establish real-time WebSocket connections and continue receiving sensitive operational updates after their account has been suspended. This vulnerability is fixed in 1.1.0.

CVE-2025-64487 getoutline vulnerability CVSS: 0 11 Feb 2026, 21:16 UTC

Outline is a service that allows for collaborative documentation. Prior to 1.1.0, a privilege escalation vulnerability exists in the Outline document management system due to inconsistent authorization checks between user and group membership management endpoints. This vulnerability is fixed in 1.1.0.

CVE-2023-54331 getoutline vulnerability CVSS: 0 13 Jan 2026, 23:16 UTC

Outline 1.6.0 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted service path in the OutlineService executable to inject malicious code that will be executed with LocalSystem permissions.

CVE-2025-58351 getoutline vulnerability CVSS: 0 03 Sep 2025, 04:16 UTC

Outline is a service that allows for collaborative documentation. In versions 0.72.0 through 0.83.0, Outline introduced a feature which facilitates local file system storage capabilities as an optional file storage strategy. This feature allowed a CSP bypass as well as a ContentType bypass that might facilitate further attacks. In the case of self-hosting and using Outline FILE_STORAGE=local on the same domain as the Outline application, a malicious payload can be uploaded as a file attachment and bypass those CSP restrictions, allowing script execution within the context of another user. This is fixed in version 0.84.0.

CVE-2024-40626 getoutline vulnerability CVSS: 0 16 Jul 2024, 17:15 UTC

Outline is an open source, collaborative document editor. A type confusion issue was found in ProseMirror’s rendering process that leads to a Stored Cross-Site Scripting (XSS) vulnerability in Outline. An authenticated user can create a document containing a malicious JavaScript payload. When other users view this document, the malicious Javascript can execute in the origin of Outline. Outline includes CSP rules to prevent third-party code execution, however in the case of self-hosting and having your file storage on the same domain as Outline a malicious payload can be uploaded as a file attachment and bypass those CSP restrictions. This issue has been addressed in release version 0.77.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-37829 getoutline vulnerability CVSS: 0 09 Jul 2024, 21:15 UTC

An issue in Outline <= v0.76.1 allows attackers to execute a session hijacking attack via user interaction with a crafted magic sign-in link.

CVE-2024-37830 getoutline vulnerability CVSS: 0 09 Jul 2024, 20:15 UTC

An issue in Outline <= v0.76.1 allows attackers to redirect a victim user to a malicious site via intercepting and changing the state cookie.

CVE-2023-3532 getoutline vulnerability CVSS: 0 07 Jul 2023, 03:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to 0.70.1.

CVE-2022-2342 getoutline vulnerability CVSS: 3.5 07 Jul 2022, 10:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to v0.64.4.