Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

541+ Articles
116+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-26477: DokuWiki media_upload_xhr() Denial of Service
CVE-2026-26477: DokuWiki media_upload_xhr() Denial of Service
SECURITYHIGHCVE-2026-26477

CVE-2026-26477: DokuWiki media_upload_xhr() Denial of Service

A high-severity denial-of-service vulnerability in DokuWiki v.2025-05-14b 'Librarian' allows remote attackers to crash the application by exploiting the media_upload_xhr() function in media.php.

Dylan H.

Security Team

April 4, 2026
4 min read

Affected Products

  • DokuWiki v.2025-05-14b 'Librarian' and earlier

Executive Summary

A high-severity denial-of-service (DoS) vulnerability has been identified in DokuWiki v.2025-05-14b "Librarian", tracked as CVE-2026-26477 with a CVSS score of 7.5. The vulnerability resides in the media_upload_xhr() function within media.php and allows a remote, unauthenticated attacker to cause the application to crash or become unresponsive.

CVSS Score: 7.5 (High)


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-26477
CVSS Score7.5 (High)
TypeDenial of Service
Attack VectorNetwork
AuthenticationNone required
User InteractionNone
Affected Componentmedia.php — media_upload_xhr() function
Affected VersionDokuWiki v.2025-05-14b 'Librarian'

Root Cause

The vulnerability is located in the media_upload_xhr() function in media.php, which handles XHR (XMLHttpRequest) media file uploads. A specially crafted request to this endpoint can trigger unexpected behavior in the upload processing logic, causing the server process to crash or consume resources until it becomes unresponsive.

The function fails to properly handle malformed or edge-case input parameters, leading to a condition that terminates the DokuWiki process or locks it into an unresponsive state.


Affected Versions

SoftwareAffected VersionStatus
DokuWikiv.2025-05-14b 'Librarian'Vulnerable

Note: Earlier releases may also be affected. Check the official DokuWiki changelog for patched version information.


Impact Assessment

Who Is at Risk

DokuWiki is a widely deployed open-source wiki platform commonly used by:

  • Corporate intranets and knowledge bases
  • Educational institutions
  • Open-source project documentation sites
  • Small-to-medium business portals

Any installation with the media upload functionality accessible — particularly those exposed to the internet or accessible to untrusted users — is potentially at risk.

Attack Scenario

1. Attacker identifies a DokuWiki instance running v.2025-05-14b
2. Attacker sends crafted XHR upload request to the media upload endpoint
3. media_upload_xhr() processes the malformed request
4. Application crashes or becomes unresponsive (denial of service)
5. Legitimate users are unable to access the wiki

While this vulnerability does not allow remote code execution or data exfiltration in its current described form, availability impact can be significant for organizations relying on DokuWiki for documentation, collaboration, or internal knowledge management.


Remediation

Immediate Actions

  1. Check your DokuWiki version — navigate to Admin > DokuWiki Configuration and note the installed version
  2. Apply the latest DokuWiki update — update to a patched release as soon as one becomes available from the DokuWiki project
  3. Restrict media upload access — if media upload functionality is not required for public users, restrict access via DokuWiki's ACL (Access Control List) system to authenticated users only
  4. Implement rate limiting — place a WAF or reverse proxy in front of the DokuWiki instance to rate-limit requests to the media upload endpoint

Temporary Mitigations

If patching is not immediately possible:

  • Disable XHR media uploads in DokuWiki configuration settings
  • Restrict the /lib/exe/ajax.php and media endpoints at the web server level (nginx/Apache) to trusted IP ranges
  • Monitor access logs for unusual patterns targeting the media upload endpoint

Detection

Log Indicators

Monitor for repeated or malformed requests to the following endpoints:

POST /lib/exe/ajax.php?call=mediau
POST /lib/exe/mediamanager.php

Unusual request patterns (high volume, malformed content-type, oversized payloads, or truncated multipart bodies) to these endpoints should be investigated.


Key Takeaways

  1. CVSS 7.5 High — Network-exploitable DoS with no authentication required
  2. Remote, unauthenticated exploitation via malformed XHR upload request
  3. Update DokuWiki to the latest patched release when available
  4. Restrict media upload access to authenticated and authorized users as an interim mitigation
  5. Monitor upload endpoints for anomalous request patterns

References

  • NVD — CVE-2026-26477
  • DokuWiki Official Site
  • DokuWiki Security Advisories
#CVE#DokuWiki#Denial of Service#Vulnerability#NVD

Related Articles

CVE-2026-5272: Chrome GPU Heap Buffer Overflow Enables Remote Code Execution

A high-severity heap buffer overflow in Chrome's GPU component allows remote attackers to execute arbitrary code via a crafted HTML page. Affects all Chrome versions prior to 146.0.7680.178.

4 min read

CVE-2026-32973: OpenClaw Exec Allowlist Bypass via Glob Wildcard Overmatch

A critical CVSS 9.8 vulnerability in OpenClaw allows attackers to bypass the exec allowlist by exploiting improper glob pattern normalization where the ? wildcard ovematches across POSIX path segments.

5 min read

CVE-2026-32975: OpenClaw Zalouser Weak Authorization via Mutable Group Display Names

A critical CVSS 9.8 authorization bypass in OpenClaw's Zalouser allowlist mode matches mutable group display names instead of stable identifiers, letting attackers create spoofed groups to hijack channel routing.

5 min read
Back to all Security Alerts