NVD Vulnerability Detail
Search Exploit, PoC
CVE-2026-44695
Summary

Outline is a service that allows for collaborative documentation. Prior to 1.7.1, the Slack integration callback for GET /auth/slack.post accepts an unsigned, session-independent OAuth state value. A third party who can obtain a Slack OAuth code for the same Outline Slack client can make a logged-in Outline user complete the callback and link that user's Outline account to the attacker's Slack team_id and user_id. The linked Slack identity can then use the Slack /outline search command as the victim Outline user. This vulnerability is fixed in 1.7.1.

Publication Date May 12, 2026, 7:22 a.m.
Registration Date May 13, 2026, 4:11 a.m.
Last Update May 12, 2026, 11:17 p.m.
CVSS3.1 : MEDIUM
スコア 5.8
Vector CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR)
利用者の関与(UI)
影響の想定範囲(S) 変更あり
機密性への影響(C)
完全性への影響(I) なし
可用性への影響(A) なし
Related information, measures and tools
Common Vulnerabilities List