CVE-2026-26477
Published: 03 April 2026
Summary
CVE-2026-26477 is a medium-severity Allocation of Resources Without Limits or Throttling (CWE-770) vulnerability in Dokuwiki Dokuwiki. Its CVSS base score is 4.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application Exhaustion Flood (T1499.003); ranked at the 36.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SC-6 (Resource Availability).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SC-5 directly implements denial-of-service protections such as rate limiting and resource throttling to prevent resource exhaustion via the media_upload_xhr() function.
SC-6 enforces resource availability protections like quotas and allocation limits to mitigate uncontrolled consumption triggered by authenticated upload requests.
SI-2 requires timely flaw remediation, including patching DokuWiki to address the specific resource exhaustion vulnerability in media.php.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a resource exhaustion flaw (CWE-400/770) in DokuWiki's media upload handler that an authenticated remote attacker can directly abuse to trigger application-level denial of service.
NVD Description
An issue in Dokuwiki v.2025-05-14b "Librarian" [56.2] allows a remote attacker to cause a denial of service via the media_upload_xhr() function in the media.php file
Deeper analysisAI
CVE-2026-26477 is a denial-of-service vulnerability affecting DokuWiki version 2025-05-14b "Librarian" (release 56.2). The flaw exists in the media_upload_xhr() function within the media.php file, where a remote attacker can trigger resource exhaustion. It is rated with a CVSS v3.1 base score of 4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) and is associated with CWE-770 (Allocation of Resources Without Limits or Throttling) and CWE-400 (Uncontrolled Resource Consumption). The vulnerability was published on 2026-04-03.
Exploitation requires low privileges, such as those of an authenticated user (PR:L), and can be performed remotely over the network with low complexity and no user interaction. A successful attack disrupts availability by causing a denial of service, such as through excessive resource consumption, but does not compromise confidentiality or integrity.
Advisories and release information are available at https://github.com/Hebing123/cve/issues/94 and https://github.com/dokuwiki/dokuwiki/releases/tag/release-2025-05-14b.
Details
- CWE(s)