CVE-2026-25859

N/A Unknown

📋 TL;DR

This vulnerability in Wekan allows non-administrative users to access migration functionality due to insufficient permission checks. This could enable unauthorized users to perform migration operations, potentially disrupting service or manipulating data. All Wekan instances running versions before 8.20 are affected.

💻 Affected Systems

Products:
  • Wekan
Versions: All versions prior to 8.20
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All Wekan deployments with non-admin users are vulnerable. The vulnerability exists in the migration endpoint permission checks.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could trigger migrations that disrupt service availability, corrupt data, or manipulate board structures and user permissions.

🟠

Likely Case

Non-admin users could accidentally or intentionally trigger migrations, causing temporary service disruption or unexpected board changes.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to minor service disruptions that can be quickly detected and rolled back.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access as any non-admin user. The vulnerability is in API endpoint access control.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.20

Vendor Advisory: https://github.com/wekan/wekan/commit/cbb1cd78de3e40264a5e047ace0ce27f8635b4e6

Restart Required: Yes

Instructions:

1. Backup your Wekan data and configuration. 2. Update Wekan to version 8.20 or later using your package manager or deployment method. 3. Restart the Wekan service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict migration endpoint access

all

Use reverse proxy or firewall rules to block access to migration endpoints for non-admin users

# Example nginx location block
location ~ ^/api/migration {
    deny all;
    allow 127.0.0.1;
    # Add admin IPs
}

🧯 If You Can't Patch

  • Implement strict network segmentation to limit which users can access Wekan administration interfaces
  • Enable detailed logging of all migration operations and set up alerts for unauthorized attempts

🔍 How to Verify

Check if Vulnerable:

Check if Wekan version is below 8.20. Review if non-admin users can access /api/migration endpoints.

Check Version:

docker exec wekan-app node -e "console.log(require('/app/package.json').version)" or check package.json in installation

Verify Fix Applied:

After updating to 8.20+, verify that non-admin users receive permission denied errors when attempting to access migration functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to migration endpoints
  • Migration operations initiated by non-admin users
  • 403 permission denied errors for migration API calls

Network Indicators:

  • HTTP POST requests to /api/migration from non-admin IPs
  • Unusual migration-related API traffic

SIEM Query:

source="wekan" AND (uri_path="/api/migration" OR message="migration") AND user_role!="admin"

🔗 References

📤 Share & Export