CVE-2026-25564

N/A Unknown

📋 TL;DR

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in WeKan versions before 8.19. Attackers can manipulate checklist identifiers to access or modify checklists across different boards without proper authorization. All WeKan instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • WeKan
Versions: All versions prior to 8.19
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All WeKan deployments with checklist functionality are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete, modify, or create checklists across all boards in the system, potentially disrupting workflows and causing data loss.

🟠

Likely Case

Unauthorized access to checklist data across boards, allowing attackers to view or tamper with checklist items they shouldn't have access to.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring in place, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.19 and later

Vendor Advisory: https://github.com/wekan/wekan/commit/08a6f084eba09487743a7c807fb4a9000fcfa9ac

Restart Required: Yes

Instructions:

1. Backup your WeKan data. 2. Update WeKan to version 8.19 or later. 3. Restart the WeKan service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Temporary Access Restriction

all

Restrict access to WeKan to trusted users only while planning the update.

🧯 If You Can't Patch

  • Implement strict network segmentation to limit WeKan access to authorized users only.
  • Enable detailed logging and monitoring for suspicious checklist-related activities.

🔍 How to Verify

Check if Vulnerable:

Check WeKan version via admin panel or by examining the deployment. If version is below 8.19, it is vulnerable.

Check Version:

Check WeKan web interface admin panel or docker inspect for version information.

Verify Fix Applied:

After updating, confirm the version is 8.19 or higher and test checklist functionality across boards.

📡 Detection & Monitoring

Log Indicators:

  • Unusual checklist creation/modification patterns across different board IDs
  • Failed authorization attempts on checklist routes

Network Indicators:

  • Unusual API calls to checklist endpoints with mismatched board/card IDs

SIEM Query:

source="wekan" AND (event="checklist_create" OR event="checklist_modify") AND board_id != expected_board_id

🔗 References

📤 Share & Export