CVE-2026-25562

N/A Unknown

📋 TL;DR

WeKan versions before 8.19 have an information disclosure vulnerability where attachment metadata can be accessed by unauthorized users. This occurs because the attachments publication doesn't properly scope results to boards and cards accessible to the requesting user. All WeKan instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • WeKan
Versions: All versions prior to 8.19
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All WeKan deployments with attachments feature enabled are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enumerate all attachment metadata across all boards, potentially revealing sensitive file names, upload dates, and board/card relationships that should be private.

🟠

Likely Case

Unauthorized users accessing metadata about attachments in boards they shouldn't have access to, potentially learning about sensitive projects or files.

🟢

If Mitigated

Limited exposure of non-sensitive metadata with proper access controls and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but minimal technical skill to access unauthorized metadata.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.19 and later

Vendor Advisory: https://github.com/wekan/wekan/commit/6dfa3beb2b6ab23438d0f4395b84bf0749eb4820

Restart Required: Yes

Instructions:

1. Backup your WeKan instance. 2. Update to WeKan version 8.19 or later. 3. Restart the WeKan service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable attachments feature

all

Temporarily disable the attachments feature to prevent metadata disclosure

Modify WeKan configuration to disable attachments upload

Restrict user access

all

Implement strict access controls and limit user permissions

Review and tighten board/card permissions in WeKan

🧯 If You Can't Patch

  • Implement network segmentation to isolate WeKan instance
  • Enable detailed logging and monitor for unusual attachment metadata access patterns

🔍 How to Verify

Check if Vulnerable:

Check WeKan version via admin interface or by examining the running container/installation

Check Version:

Check WeKan web interface admin panel or docker inspect for version information

Verify Fix Applied:

Confirm version is 8.19 or later and test that authenticated users cannot access attachment metadata from boards they don't have permission to view

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns of attachment metadata requests from users
  • Requests for attachment data from boards the user shouldn't access

Network Indicators:

  • Increased API calls to attachments endpoints from single users

SIEM Query:

source="wekan" AND (event="attachment_metadata" OR endpoint="/api/attachments") AND user NOT IN authorized_users

🔗 References

📤 Share & Export