CVE-2026-25563

N/A Unknown

📋 TL;DR

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in WeKan versions before 8.19. Attackers can manipulate checklist identifiers to access or modify checklists across different boards without authorization. All WeKan instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • WeKan
Versions: All versions prior to 8.19
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All WeKan deployments using vulnerable versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read, modify, or delete checklists across all boards in the system, potentially exposing sensitive task information or disrupting workflow management.

🟠

Likely Case

Unauthorized access to checklist data across boards, allowing attackers to view or tamper with checklist items they shouldn't have access to.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, though the vulnerability still exists at the application layer.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is well-documented in public advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.19 and later

Vendor Advisory: https://github.com/wekan/wekan/commit/5cd875813fdec5a3c40a0358b30a347967c85c14

Restart Required: Yes

Instructions:

1. Backup your WeKan data and configuration. 2. Update WeKan to version 8.19 or later using your deployment method (Docker, Snap, or source). 3. Restart the WeKan service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to WeKan to trusted users only

Enhanced Monitoring

all

Implement additional logging and monitoring for checklist access patterns

🧯 If You Can't Patch

  • Implement strict access controls and user permission reviews
  • Deploy WAF rules to detect and block suspicious ID manipulation patterns

🔍 How to Verify

Check if Vulnerable:

Check WeKan version via admin interface or by examining the running container/process

Check Version:

docker inspect wekan/wekan | grep WEKAN_VERSION || snap info wekan || check WeKan admin panel

Verify Fix Applied:

Confirm version is 8.19 or later and test checklist creation with manipulated IDs

📡 Detection & Monitoring

Log Indicators:

  • Unusual checklist access patterns across different board IDs
  • Failed authorization attempts on checklist routes

Network Indicators:

  • HTTP requests with manipulated cardId and boardId parameters

SIEM Query:

source="wekan" AND (uri_path="/api/boards/*/cards/*/checklists" OR uri_path="/api/checklists/*") AND (cardId NOT IN expected_board_cards)

🔗 References

📤 Share & Export