CVE-2026-40870
Published:April 21, 2026
Updated:April 25, 2026
Decidim is a participatory democracy framework. Starting in version 0.0.1 and prior to versions 0.30.5 and 0.31.1, the root level "commentable" field in the API allows access to all commentable resources within the platform, without any permission checks. All Decidim instances are impacted that have not secured the "/api" endpoint. The "/api" endpoint is publicly available with the default configuration. Versions 0.30.5 and 0.31.1 fix the issue. As a workaround, limit the scope to only authenticated users by limiting access to the "/api" endpoint. This would require custom code or installing the 3rd party module "Decidim::Apiauth". With custom code, the "/api" endpoint can be limited to only authenticated users. The same configuration can be also used without the "allow" statements to disable all traffic to the the "/api" endpoint. When considering a workaround and the seriousness of the vulnerability, please consider the nature of the platform. If the platform is primarily serving public data, this vulnerability is not serious by its nature. If the platform is protecting some resources, e.g. inside private participation spaces, the vulnerability may expose some data to the attacker that is not meant public. For those who have enabled the organization setting "Force users to authenticate before access organization", the scope of this vulnerability is limited to the users who are allowed to log in to the Decidim platform. This setting was introduced in version 0.19.0 and it was applied to the "/api" endpoint in version 0.22.0.
Affected Packages
decidim-comments (RUBY):
Affected version(s) =0.31.0 <0.31.1Fix Suggestion:
Update to version 0.31.1decidim-api (RUBY):
Affected version(s) =0.31.0 <0.31.1Fix Suggestion:
Update to version 0.31.1decidim-comments (RUBY):
Affected version(s) >=0.0.1 <0.30.5Fix Suggestion:
Update to version 0.30.5decidim-api (RUBY):
Affected version(s) >=0.0.1 <0.30.5Fix Suggestion:
Update to version 0.30.5Related Resources (1)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.7
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Missing Authorization
EPSS
Base Score:
0.03