CVE-2026-25568

N/A Unknown

📋 TL;DR

This CVE describes an authorization bypass vulnerability in WeKan where the allowPrivateOnly configuration setting is not properly enforced. When enabled, this setting should restrict users to creating only private boards, but due to incomplete server-side validation, users can still create public boards. This affects all WeKan instances with allowPrivateOnly enabled prior to version 8.19.

💻 Affected Systems

Products:
  • WeKan
Versions: All versions prior to 8.19
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when allowPrivateOnly configuration setting is enabled. Default configuration is not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive information could be exposed through unauthorized public boards, potentially leaking confidential project data, user information, or internal communications to unauthorized parties.

🟠

Likely Case

Users inadvertently or intentionally create public boards when they should be restricted to private-only creation, leading to unintended data exposure within the organization.

🟢

If Mitigated

With proper monitoring and user awareness, the impact is limited to potential minor data exposure that can be quickly detected and remediated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access. The vulnerability is straightforward to exploit by any authenticated user attempting to create a public board when allowPrivateOnly is enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.19 and later

Vendor Advisory: https://github.com/wekan/wekan/commit/7ed76c180ede46ab1dac6b8ad27e9128a272c2c8

Restart Required: Yes

Instructions:

1. Update WeKan to version 8.19 or later. 2. Restart the WeKan service. 3. Verify the allowPrivateOnly setting is properly enforced by testing board creation.

🔧 Temporary Workarounds

Disable allowPrivateOnly setting

all

Temporarily disable the allowPrivateOnly configuration setting until patching is possible

Edit WeKan configuration to set allowPrivateOnly: false

🧯 If You Can't Patch

  • Implement strict monitoring of board creation events and audit logs for public board creation attempts
  • Educate users about the restriction and implement manual review processes for board creation

🔍 How to Verify

Check if Vulnerable:

Check if allowPrivateOnly is enabled in configuration and test creating a public board as an authenticated user. If public board creation succeeds, the system is vulnerable.

Check Version:

Check WeKan version in admin panel or via API endpoint

Verify Fix Applied:

After updating to version 8.19+, enable allowPrivateOnly and attempt to create a public board. Creation should be blocked with appropriate error message.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing successful public board creation when allowPrivateOnly is enabled
  • Audit logs with board creation events

Network Indicators:

  • API calls to create boards with public visibility setting

SIEM Query:

source="wekan" AND (event="board_create" OR event="board_creation") AND visibility="public"

🔗 References

📤 Share & Export