CVE-2026-25565

N/A Unknown

📋 TL;DR

This CVE describes an authorization vulnerability in WeKan where users with read-only board roles can perform card updates that should require write permissions. The vulnerability affects WeKan instances where users have been assigned read-only access to boards. This allows unauthorized modification of card content, labels, assignments, and other attributes.

💻 Affected Systems

Products:
  • WeKan
Versions: All versions prior to 8.19
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments where board read-only roles are used. The vulnerability is in the API authorization logic.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Read-only users could modify critical card data, delete cards, or manipulate workflow states, potentially disrupting project management and causing data integrity issues.

🟠

Likely Case

Read-only users inadvertently or intentionally modifying card details they shouldn't have access to change, leading to data inconsistencies and workflow disruptions.

🟢

If Mitigated

Minimal impact if proper role-based access controls are enforced and users only have appropriate permissions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user with read-only board access. The vulnerability is straightforward to exploit once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.19 and later

Vendor Advisory: https://github.com/wekan/wekan/commit/181f837d8cbae96bdf9dcbd31beaa3653c2c0285

Restart Required: Yes

Instructions:

1. Backup your WeKan instance and database. 2. Update WeKan to version 8.19 or later using your deployment method (Docker, Snap, or source). 3. Restart the WeKan service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Temporary role adjustment

all

Temporarily remove read-only board roles or upgrade users to write roles if they need to perform updates

🧯 If You Can't Patch

  • Review and audit all user board permissions, removing unnecessary read-only access
  • Implement additional monitoring for card update activities from read-only users

🔍 How to Verify

Check if Vulnerable:

Check WeKan version via admin panel or by examining the deployment. If version is below 8.19, the system is vulnerable.

Check Version:

Check WeKan admin panel or run: docker inspect wekan/wekan | grep WEKAN_VERSION or check package version in your deployment

Verify Fix Applied:

After updating to 8.19+, test that read-only users cannot perform card updates on boards where they only have read access.

📡 Detection & Monitoring

Log Indicators:

  • API calls to card update endpoints from users with read-only roles
  • Unexpected card modifications from users with limited permissions

Network Indicators:

  • POST/PUT requests to /api/boards/*/cards/* endpoints from unauthorized users

SIEM Query:

source="wekan" AND (event="card-update" OR event="card-modified") AND user_role="read-only"

🔗 References

📤 Share & Export