CVE-2026-30855

8.8 HIGH

📋 TL;DR

WeKnora versions before 0.3.2 have an authorization bypass vulnerability in tenant management endpoints. Any authenticated user can read, modify, or delete any tenant by ID, and since account registration is open to the public, unauthenticated attackers can register accounts and exploit this. This enables cross-tenant account takeover and destruction, affecting all WeKnora deployments with vulnerable versions.

💻 Affected Systems

Products:
  • WeKnora
Versions: All versions prior to 0.3.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is present in the default configuration of WeKnora, as it involves authorization logic in tenant management endpoints.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all tenant data, including deletion of all tenants and their associated documents, leading to total service disruption and data loss.

🟠

Likely Case

Attackers register accounts and exploit the vulnerability to access, modify, or delete tenant data across the system, resulting in data breaches and potential service outages.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized access attempts that are detected and blocked, but the vulnerability still poses a high risk if exploited.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires account registration (which is open) followed by simple API calls to tenant endpoints, making it straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.3.2

Vendor Advisory: https://github.com/Tencent/WeKnora/security/advisories/GHSA-ccj6-79j6-cq5q

Restart Required: Yes

Instructions:

1. Backup your WeKnora data and configuration. 2. Update WeKnora to version 0.3.2 or later using your package manager or by downloading from the official repository. 3. Restart the WeKnora service to apply the patch.

🔧 Temporary Workarounds

Disable Public Account Registration

all

Temporarily disable public account registration to prevent unauthenticated attackers from creating accounts, reducing the attack surface.

Modify WeKnora configuration to set 'allow_public_registration' to false and restart the service.

Restrict Access to Tenant Management Endpoints

all

Use network firewalls or web application firewalls to block or restrict access to tenant management API endpoints.

Configure firewall rules to deny external access to paths like '/api/tenant/*' except from trusted IPs.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WeKnora instances from untrusted networks.
  • Enable detailed logging and monitoring for tenant management activities to detect and respond to exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check the WeKnora version; if it is below 0.3.2, the system is vulnerable. Test by attempting to access tenant management endpoints with a low-privilege account.

Check Version:

weknora --version or check the version in the application configuration file.

Verify Fix Applied:

After updating to 0.3.2 or later, verify that low-privilege users cannot access or modify tenant data they do not own.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to tenant management endpoints, especially from newly registered accounts.
  • Failed authorization attempts or successful modifications to tenant data by unauthorized users.

Network Indicators:

  • HTTP requests to paths like '/api/tenant/*' from untrusted sources or with unexpected parameters.

SIEM Query:

source="weknora_logs" AND (uri_path="/api/tenant/*" AND user_role!="admin")

🔗 References

📤 Share & Export