Home

Description

Wekan is an open source kanban tool built with Meteor. In versions 8.31.0 through 8.33, the board composite publication in Wekan publishes all integration data for a board without any field filtering, exposing sensitive fields including webhook URLs and authentication tokens to any subscriber. Since board publications are accessible to all board members regardless of their role (including read-only and comment-only users), and even to unauthenticated DDP clients for public boards, any user who can access a board can retrieve its webhook credentials. This token leak allows attackers to make unauthenticated requests to the exposed webhooks, potentially triggering unauthorized actions in connected external services. This issue has been fixed in version 8.34.

PUBLISHED Reserved 2026-03-05 | Published 2026-03-06 | Updated 2026-03-06 | Assigner GitHub_M




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

CWE-862: Missing Authorization

Product status

>= 8.31.0, < 8.34
affected

References

securitylab.github.com/advisories/GHSL-2026-036_Wekan/

github.com/...ommit/8c00adc6b865653bd717a946dd646eb54ac78c9c

github.com/wekan/wekan/releases/tag/v8.34

cve.org (CVE-2026-30845)

nvd.nist.gov (CVE-2026-30845)

Download JSON