Home

Description

A vulnerability was detected in WeKan up to 8.20. This impacts an unknown function of the file models/checklistItems.js of the component REST API. Performing a manipulation of the argument item.cardId/item.checklistId/card.boardId results in improper authorization. Remote exploitation of the attack is possible. Upgrading to version 8.21 will fix this issue. The patch is named 251d49eea94834cf351bb395808f4a56fb4dbb44. Upgrading the affected component is recommended.

PUBLISHED Reserved 2026-02-04 | Published 2026-02-04 | Updated 2026-02-23 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:OF/RC:C

Problem types

Improper Authorization

Incorrect Privilege Assignment

Timeline

2026-02-04:Advisory disclosed
2026-02-04:VulDB entry created
2026-02-12:VulDB entry last update

Credits

MegaManSec (VulDB User) reporter

References

vuldb.com/?id.344266 (VDB-344266 | WeKan REST API checklistItems.js Checklist REST Bleed improper authorization) vdb-entry technical-description

vuldb.com/?ctiid.344266 (VDB-344266 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.742663 (Submit #742663 | Wekan <8.21 IDOR via REST API / improper object relationship validation) third-party-advisory

github.com/...ommit/251d49eea94834cf351bb395808f4a56fb4dbb44 patch

github.com/wekan/wekan/releases/tag/v8.21 patch

github.com/wekan/wekan/ product

cve.org (CVE-2026-1894)

nvd.nist.gov (CVE-2026-1894)

Download JSON