📦 Wekan

by Wekan Project

🔍 What is Wekan?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2025-65778

HIGH CVSS 8.1 Dec 15, 2025

This vulnerability allows attackers to upload malicious attachments that are served with HTML content types, enabling cross-site scripting (XSS) attacks within the Wekan application's origin. Attacker...

CVE-2025-65779

HIGH CVSS 7.5 Dec 15, 2025

CVE-2025-65779 is an improper access control vulnerability in Wekan that allows unauthenticated attackers to modify the sort order of boards. This affects all Wekan deployments running versions up to ...

CVE-2025-65780

HIGH CVSS 8.8 Dec 15, 2025

Authenticated users in Wekan versions up to 18.15 can modify their entire user document, including organization/team memberships and account status fields, due to missing server-side authorization che...

CVE-2025-65781

HIGH CVSS 8.2 Dec 15, 2025

This vulnerability in Wekan allows attackers to cause application-layer denial of service (DoS) by sending any non-empty Authorization bearer token to the attachment upload API. The system incorrectly...

CVE-2026-2205

MEDIUM CVSS 4.3 Feb 8, 2026

This vulnerability in WeKan allows remote attackers to access sensitive information through the Meteor Publication Handler in the cards.js component. It affects all WeKan instances up to version 8.20....

CVE-2026-2206

MEDIUM CVSS 6.3 Feb 8, 2026

This vulnerability in WeKan allows improper access controls through the Administrative Repair Handler component. Attackers can remotely exploit this flaw to potentially gain unauthorized administrativ...

CVE-2026-2208

MEDIUM CVSS 4.3 Feb 8, 2026

This CVE describes a missing authorization vulnerability in WeKan's Rules Handler component that allows unauthorized access to functionality. Attackers can exploit this remotely to perform actions wit...

CVE-2026-2209

MEDIUM CVSS 6.3 Feb 8, 2026

This vulnerability in WeKan allows remote attackers to bypass authorization controls in the custom translation handler. Attackers can manipulate translation settings without proper permissions. All We...

CVE-2026-2207

MEDIUM CVSS 5.3 Feb 8, 2026

This vulnerability in WeKan versions up to 8.20 allows remote attackers to access sensitive information through the Activity Publication Handler component. The weakness in the activities.js file enabl...

CVE-2026-25566

MEDIUM CVSS 5.4 Feb 7, 2026

This CVE describes an authorization vulnerability in WeKan's card movement functionality. Users can move cards to boards, lists, or swimlanes without proper authorization checks for the destination, p...

CVE-2026-1964

MEDIUM CVSS 4.3 Feb 5, 2026

This vulnerability in WeKan allows improper access controls through the REST endpoint, potentially enabling unauthorized access to board data. It affects WeKan installations up to version 8.20. Remote...

CVE-2026-1963

MEDIUM CVSS 6.3 Feb 5, 2026

This CVE describes an improper access control vulnerability in WeKan's attachment storage component. Attackers can remotely exploit this to access or manipulate attachments they shouldn't have permiss...

CVE-2026-1962

MEDIUM CVSS 6.3 Feb 5, 2026

This vulnerability in WeKan's attachment migration component allows attackers to bypass access controls and potentially access or manipulate attachments they shouldn't have permission to. It affects a...

CVE-2026-1894

MEDIUM CVSS 6.3 Feb 4, 2026

This vulnerability in WeKan allows attackers to bypass authorization checks in the REST API by manipulating card/board ID parameters. Remote attackers can potentially access or modify data they should...

CVE-2026-1895

MEDIUM CVSS 6.3 Feb 4, 2026

CVE-2026-1895 is an improper access control vulnerability in WeKan's attachment storage handler that allows remote attackers to bypass intended restrictions. This affects WeKan versions up to 8.20, po...

CVE-2025-65782

MEDIUM CVSS 6.5 Dec 15, 2025

An authorization flaw in Wekan's card update handling allows authenticated board members to manipulate vote arrays by adding/removing arbitrary user IDs. This enables vote forgery and unauthorized vot...