CVE-2026-25567

N/A Unknown

📋 TL;DR

This CVE describes an insecure direct object reference (IDOR) vulnerability in WeKan versions before 8.19. Authenticated users can spoof comment authorship by manipulating the authorId parameter in card comment creation requests, allowing them to impersonate other users in comment attribution. This affects all WeKan instances running vulnerable versions.

💻 Affected Systems

Products:
  • WeKan
Versions: All versions prior to 8.19
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WeKan deployments regardless of configuration. Requires authenticated user access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious insider or compromised account could attribute inappropriate or malicious comments to other users, potentially causing reputation damage, false accusations, or social engineering attacks within the organization.

🟠

Likely Case

Users with legitimate access could play pranks or create confusion by making it appear other team members made specific comments, disrupting collaboration and creating attribution confusion.

🟢

If Mitigated

With proper logging and user awareness, the impact is limited to attribution confusion rather than data compromise or privilege escalation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is trivial via API manipulation. No public exploit code identified but trivial to craft.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.19 and later

Vendor Advisory: https://github.com/wekan/wekan/commit/67cb47173c1a152d9eaf5469740992b2dacdf62d

Restart Required: Yes

Instructions:

1. Backup your WeKan instance and data. 2. Update WeKan to version 8.19 or later using your deployment method (Docker, Snap, or source). 3. Restart the WeKan service. 4. Verify the update was successful.

🔧 Temporary Workarounds

API Request Validation

all

Implement middleware or reverse proxy rules to validate that authorId matches authenticated user ID for comment creation endpoints

🧯 If You Can't Patch

  • Implement strict access controls and monitor comment creation logs for authorId mismatches
  • Educate users about the vulnerability and establish procedures for verifying comment authorship

🔍 How to Verify

Check if Vulnerable:

Check WeKan version via admin panel or by examining the running container/process. Versions below 8.19 are vulnerable.

Check Version:

docker inspect wekan/wekan | grep WEKAN_VERSION || snap info wekan || check WeKan admin interface

Verify Fix Applied:

After updating to 8.19+, attempt to create a comment with a different user's authorId parameter - this should fail or be ignored.

📡 Detection & Monitoring

Log Indicators:

  • API requests to comment creation endpoints where authorId parameter differs from authenticated user ID
  • Unusual comment attribution patterns

Network Indicators:

  • POST requests to /api/boards/*/lists/*/cards/*/comments with manipulated authorId

SIEM Query:

source="wekan" AND (uri_path="/api/boards/*/lists/*/cards/*/comments" AND http_method="POST") AND (authorId != authenticated_user_id)

🔗 References

📤 Share & Export