Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65780: n/a

0
High
VulnerabilityCVE-2025-65780cvecve-2025-65780
Published: Mon Dec 15 2025 (12/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Wekan The Open Source kanban board system up to version 18.15, fixed in 18.16. Authenticated users can update their entire user document (beyond profile fields), including orgs/teams and loginDisabled, due to missing server-side authorization checks; this enables privilege escalation and unauthorized access to other teams/orgs.

AI-Powered Analysis

AILast updated: 12/22/2025, 15:37:39 UTC

Technical Analysis

CVE-2025-65780 is a critical authorization vulnerability discovered in Wekan, an open-source kanban board system widely used for task and project management. The issue exists in all versions up to 18.15 and was resolved in version 18.16. The root cause is the absence of proper server-side authorization checks when authenticated users attempt to update their user documents. Normally, users should only be able to modify limited profile fields; however, due to this flaw, they can alter the entire user document, including sensitive attributes such as organizational affiliations (orgs/teams) and the loginDisabled flag. This unauthorized modification capability allows attackers to escalate privileges by assigning themselves to other teams or organizations, or by re-enabling disabled accounts, thereby gaining unauthorized access to resources and data across different organizational boundaries. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only needs privileges of an authenticated user (PR:L) without any user interaction (UI:N). The impact spans confidentiality, integrity, and availability (C:H/I:H/A:H), as attackers can access sensitive data, manipulate user roles, and potentially disrupt operations. Although no exploits are currently known in the wild, the severity and ease of exploitation make this a significant threat. The CWE classification is CWE-284 (Improper Access Control), highlighting the failure to enforce proper authorization. Organizations relying on Wekan for collaboration and project tracking should prioritize upgrading to version 18.16 or later to remediate this vulnerability.

Potential Impact

For European organizations, the impact of CVE-2025-65780 can be substantial, particularly for those using Wekan in environments with multiple teams or organizational units. Unauthorized privilege escalation can lead to data breaches, exposing sensitive project information and internal communications. Attackers could manipulate team memberships to access confidential tasks or documents, undermining confidentiality. Integrity is compromised as unauthorized users can alter project data or user statuses, potentially disrupting workflows or causing operational confusion. Availability may also be affected if attackers disable legitimate user accounts or manipulate access controls, leading to denial of service for legitimate users. Given the collaborative nature of Wekan, such breaches could cascade into broader organizational risks, including regulatory compliance violations under GDPR if personal or sensitive data is exposed. The risk is amplified in sectors with strict data protection requirements such as finance, healthcare, and government institutions across Europe.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade Wekan installations to version 18.16 or later, where the authorization checks have been properly implemented. Until patching is complete, restrict access to Wekan to trusted users only and review user privileges to ensure minimal necessary access. Implement network-level controls such as VPNs or IP whitelisting to limit exposure. Conduct thorough audits of user accounts and organizational memberships to detect any unauthorized changes. Employ monitoring and alerting for unusual user document modifications or privilege escalations. Additionally, enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of compromised credentials. Regularly review and update access control policies to ensure they align with the principle of least privilege. Finally, educate users about the importance of reporting suspicious activity promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694017f1d9bcdf3f3ddec58f

Added to database: 12/15/2025, 2:15:13 PM

Last enriched: 12/22/2025, 3:37:39 PM

Last updated: 2/7/2026, 6:28:18 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats