Description
A vulnerability was detected in WeKan up to 8.20. This impacts an unknown function of the file models/checklistItems.js of the component REST API. Performing a manipulation of the argument item.cardId/item.checklistId/card.boardId results in improper authorization. Remote exploitation of the attack is possible. Upgrading to version 8.21 will fix this issue. The patch is named 251d49eea94834cf351bb395808f4a56fb4dbb44. Upgrading the affected component is recommended.
Problem types
Incorrect Privilege Assignment
Timeline
| 2026-02-04: | Advisory disclosed |
| 2026-02-04: | VulDB entry created |
| 2026-02-12: | VulDB entry last update |
Credits
MegaManSec (VulDB User)
References
vuldb.com/?id.344266 (VDB-344266 | WeKan REST API checklistItems.js Checklist REST Bleed improper authorization)
vuldb.com/?ctiid.344266 (VDB-344266 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.742663 (Submit #742663 | Wekan <8.21 IDOR via REST API / improper object relationship validation)
github.com/...ommit/251d49eea94834cf351bb395808f4a56fb4dbb44
github.com/wekan/wekan/releases/tag/v8.21
github.com/wekan/wekan/