Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65779: n/a

0
Medium
VulnerabilityCVE-2025-65779cvecve-2025-65779
Published: Mon Dec 15 2025 (12/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65779 is a vulnerability in Wekan, an open-source kanban board system, affecting versions up to 18. 15. The flaw allows unauthenticated attackers to update a board's 'sort' value due to improper authorization checks in the Boards. allow function, which returns true without verifying user identity. This enables arbitrary reordering of boards without requiring user authentication. Although no known exploits are currently reported in the wild, the vulnerability could disrupt board organization and workflow integrity. The issue was fixed in version 18. 16. European organizations using Wekan for project management could face operational disruption and potential workflow confusion. Mitigation involves promptly upgrading to version 18.

AI-Powered Analysis

AILast updated: 12/15/2025, 14:31:05 UTC

Technical Analysis

CVE-2025-65779 is a security vulnerability identified in Wekan, an open-source kanban board system widely used for project and task management. The vulnerability exists in versions up to 18.15 and stems from improper authorization logic in the Boards.allow function. Specifically, this function returns true without verifying the userId, allowing unauthenticated attackers to update the 'sort' attribute of boards. This 'sort' value controls the order in which boards are displayed, so an attacker can arbitrarily reorder boards without any authentication or user interaction. While this does not directly expose sensitive data or allow code execution, it undermines the integrity of the board's organization, potentially causing confusion, workflow disruption, or denial of orderly access to project information. The vulnerability was publicly disclosed and fixed in version 18.16 of Wekan. No CVSS score has been assigned, and no known exploits have been reported in the wild as of the publication date. The flaw is primarily an authorization bypass issue affecting the integrity of board ordering, with no direct impact on confidentiality or availability.

Potential Impact

For European organizations, the primary impact of CVE-2025-65779 is operational disruption and reduced trust in the integrity of project management workflows. Unauthorized reordering of boards can cause confusion among teams, misprioritization of tasks, and potential delays in project delivery. While this vulnerability does not expose sensitive data or allow system compromise, it can degrade productivity and collaboration efficiency. Organizations relying heavily on Wekan for agile project management or cross-team coordination may experience workflow interruptions. Additionally, the presence of an unauthenticated vector increases the risk of automated or opportunistic attacks, especially in publicly accessible deployments. Although the impact is not critical, it highlights the importance of proper authorization checks in collaborative software. European entities with compliance requirements around data integrity and operational continuity should prioritize remediation to maintain governance standards.

Mitigation Recommendations

To mitigate CVE-2025-65779, organizations should immediately upgrade Wekan installations to version 18.16 or later, where the authorization flaw has been corrected. For environments where immediate upgrade is not feasible, implement network-level access controls to restrict public access to Wekan instances, such as VPNs or IP whitelisting. Conduct a thorough audit of user permissions and access control configurations to ensure no other endpoints suffer from similar authorization bypass issues. Monitor logs for unusual board reorder activities that could indicate exploitation attempts. Additionally, educate users about potential workflow anomalies and establish incident response procedures to quickly address any disruptions. Regularly review and apply security patches for all open-source collaboration tools to reduce exposure to similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694017f1d9bcdf3f3ddec589

Added to database: 12/15/2025, 2:15:13 PM

Last enriched: 12/15/2025, 2:31:05 PM

Last updated: 12/15/2025, 4:29:08 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats