Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65778: n/a

0
High
VulnerabilityCVE-2025-65778cvecve-2025-65778
Published: Mon Dec 15 2025 (12/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65778 is a vulnerability in Wekan, an open-source kanban board system, affecting versions up to 18. 15. The flaw allows attackers to upload attachments that are served with a malicious Content-Type header (text/html), enabling execution of attacker-controlled HTML and JavaScript within the application's origin. This can lead to session and token theft as well as Cross-Site Request Forgery (CSRF) attacks. The vulnerability was fixed in version 18. 16. There are no known exploits in the wild as of now. Exploitation does not require authentication but does require the ability to upload files. The vulnerability poses a significant risk to confidentiality and integrity of user sessions and data. European organizations using Wekan, especially in countries with high adoption of open-source collaboration tools, are at risk.

AI-Powered Analysis

AILast updated: 12/15/2025, 14:31:23 UTC

Technical Analysis

CVE-2025-65778 is a security vulnerability identified in Wekan, an open-source kanban board system widely used for project management and collaboration. The issue exists in versions up to 18.15 and was resolved in version 18.16. The vulnerability arises because uploaded attachments can be served with an attacker-controlled Content-Type header set to text/html. This improper handling allows an attacker to inject and execute arbitrary HTML and JavaScript code within the context of the Wekan application’s origin. Such execution can lead to theft of session tokens or authentication cookies, enabling attackers to hijack user sessions. Additionally, the vulnerability facilitates Cross-Site Request Forgery (CSRF) attacks, where malicious requests can be made on behalf of authenticated users without their consent. The attack vector requires the attacker to have the ability to upload files to the Wekan instance, which may be possible if the application is publicly accessible or if user accounts are compromised or created. No CVSS score has been assigned yet, and there are no known exploits in the wild. The vulnerability impacts the confidentiality and integrity of user data and sessions, potentially allowing attackers to gain unauthorized access and perform actions within the application as legitimate users. The root cause is inadequate validation and sanitization of uploaded file metadata, specifically the Content-Type header, which should be strictly controlled to prevent execution of active content. The fix in version 18.16 likely involves enforcing safe Content-Type headers and sanitizing uploaded content to prevent script execution.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive project management data and user credentials. Successful exploitation can lead to session hijacking, allowing attackers to impersonate legitimate users and access confidential information or manipulate project workflows. CSRF attacks can result in unauthorized actions being performed, potentially disrupting business processes or leaking sensitive data. Organizations relying on Wekan for internal collaboration, especially those with public-facing instances or weak access controls, are particularly vulnerable. The impact is amplified in sectors with stringent data protection requirements, such as finance, healthcare, and government, where unauthorized access could lead to regulatory penalties under GDPR. Additionally, the ease of exploitation—requiring only file upload capability without authentication—raises the threat level for organizations with open or poorly secured Wekan deployments. The lack of known exploits currently provides a window for proactive mitigation, but the potential for rapid weaponization exists given the straightforward nature of the attack vector.

Mitigation Recommendations

European organizations should immediately upgrade all Wekan instances to version 18.16 or later, where the vulnerability is patched. In addition to upgrading, implement strict Content-Type validation on the server side to ensure uploaded files are served with safe and expected MIME types, rejecting or sanitizing any files with potentially executable content types such as text/html. Employ file upload restrictions, including limiting allowed file types and scanning uploads for malicious content. Configure Content Security Policy (CSP) headers to restrict execution of inline scripts and reduce the impact of any injected malicious code. Enforce strong access controls and authentication mechanisms to limit who can upload files, and monitor upload activity for suspicious behavior. Regularly audit and update Wekan deployments and dependencies to incorporate security patches promptly. Educate users about phishing and social engineering risks that could facilitate unauthorized file uploads. Finally, consider isolating Wekan instances behind VPNs or internal networks where feasible to reduce exposure to external attackers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694017f1d9bcdf3f3ddec583

Added to database: 12/15/2025, 2:15:13 PM

Last enriched: 12/15/2025, 2:31:23 PM

Last updated: 12/15/2025, 4:35:29 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats