Home

Description

A security vulnerability has been detected in WeKan up to 8.20. This affects the function setBoardOrgs of the file models/boards.js of the component REST API. Such manipulation of the argument item.cardId/item.checklistId/card.boardId leads to improper authorization. The attack may be launched remotely. A high complexity level is associated with this attack. The exploitability is reported as difficult. Upgrading to version 8.21 mitigates this issue. The name of the patch is cabfeed9a68e21c469bf206d8655941444b9912c. It is suggested to upgrade the affected component.

PUBLISHED Reserved 2026-02-04 | Published 2026-02-04 | Updated 2026-02-23 | Assigner VulDB




LOW: 2.3CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X
MEDIUM: 5.0CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C
MEDIUM: 5.0CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C
4.6AV:N/AC:H/Au:S/C:P/I:P/A:P/E:ND/RL:OF/RC:C

Problem types

Improper Authorization

Incorrect Privilege Assignment

Timeline

2026-02-04:Advisory disclosed
2026-02-04:VulDB entry created
2026-02-05:VulDB entry last update

Credits

MegaManSec (VulDB User) reporter

References

vuldb.com/?id.344265 (VDB-344265 | WeKan REST API boards.js setBoardOrgs improper authorization) vdb-entry technical-description

vuldb.com/?ctiid.344265 (VDB-344265 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.742662 (Submit #742662 | Wekan <8.21 IDOR via REST API / improper object relationship validation) third-party-advisory

github.com/...ommit/cabfeed9a68e21c469bf206d8655941444b9912c patch

github.com/wekan/wekan/releases/tag/v8.21 patch

github.com/wekan/wekan/ product

cve.org (CVE-2026-1892)

nvd.nist.gov (CVE-2026-1892)

Download JSON