We recently identified a vulnerability in Joplin Server that could potentially allow privilege escalation by exploiting an API endpoint.
Fix in version 3.3.3
The vulnerability has been fixed in Joplin Server version 3.3.3 and we strongly recommend all users to upgrade to this version as soon as possible to ensure the security of their systems.
Impact on Joplin Cloud
While Joplin Cloud may have been affected, it uses a separate domain for the API, which means the known proof of concept does not work on Joplin Cloud. Additionally our logs have been inspected over the past 12 months, and no attempts to exploit this vulnerability were detected. Joplin Cloud has now been upgraded to the fixed version to ensure continued security.
Next steps
We will provide more details about the vulnerability soon. In the meantime, please ensure that your Joplin Server is updated to version 3.3.3.
If you have any question please ask here.