CVE-2025-65780: n/a
An issue was discovered in Wekan The Open Source kanban board system up to version 18.15, fixed in 18.16. Authenticated users can update their entire user document (beyond profile fields), including orgs/teams and loginDisabled, due to missing server-side authorization checks; this enables privilege escalation and unauthorized access to other teams/orgs.
AI Analysis
Technical Summary
CVE-2025-65780 is a critical authorization vulnerability discovered in Wekan, an open-source kanban board system widely used for task and project management. The issue exists in all versions up to 18.15 and was resolved in version 18.16. The root cause is the absence of proper server-side authorization checks when authenticated users attempt to update their user documents. Normally, users should only be able to modify limited profile fields; however, due to this flaw, they can alter the entire user document, including sensitive attributes such as organizational affiliations (orgs/teams) and the loginDisabled flag. This unauthorized modification capability allows attackers to escalate privileges by assigning themselves to other teams or organizations, or by re-enabling disabled accounts, thereby gaining unauthorized access to resources and data across different organizational boundaries. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only needs privileges of an authenticated user (PR:L) without any user interaction (UI:N). The impact spans confidentiality, integrity, and availability (C:H/I:H/A:H), as attackers can access sensitive data, manipulate user roles, and potentially disrupt operations. Although no exploits are currently known in the wild, the severity and ease of exploitation make this a significant threat. The CWE classification is CWE-284 (Improper Access Control), highlighting the failure to enforce proper authorization. Organizations relying on Wekan for collaboration and project tracking should prioritize upgrading to version 18.16 or later to remediate this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-65780 can be substantial, particularly for those using Wekan in environments with multiple teams or organizational units. Unauthorized privilege escalation can lead to data breaches, exposing sensitive project information and internal communications. Attackers could manipulate team memberships to access confidential tasks or documents, undermining confidentiality. Integrity is compromised as unauthorized users can alter project data or user statuses, potentially disrupting workflows or causing operational confusion. Availability may also be affected if attackers disable legitimate user accounts or manipulate access controls, leading to denial of service for legitimate users. Given the collaborative nature of Wekan, such breaches could cascade into broader organizational risks, including regulatory compliance violations under GDPR if personal or sensitive data is exposed. The risk is amplified in sectors with strict data protection requirements such as finance, healthcare, and government institutions across Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade Wekan installations to version 18.16 or later, where the authorization checks have been properly implemented. Until patching is complete, restrict access to Wekan to trusted users only and review user privileges to ensure minimal necessary access. Implement network-level controls such as VPNs or IP whitelisting to limit exposure. Conduct thorough audits of user accounts and organizational memberships to detect any unauthorized changes. Employ monitoring and alerting for unusual user document modifications or privilege escalations. Additionally, enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of compromised credentials. Regularly review and update access control policies to ensure they align with the principle of least privilege. Finally, educate users about the importance of reporting suspicious activity promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain
CVE-2025-65780: n/a
Description
An issue was discovered in Wekan The Open Source kanban board system up to version 18.15, fixed in 18.16. Authenticated users can update their entire user document (beyond profile fields), including orgs/teams and loginDisabled, due to missing server-side authorization checks; this enables privilege escalation and unauthorized access to other teams/orgs.
AI-Powered Analysis
Technical Analysis
CVE-2025-65780 is a critical authorization vulnerability discovered in Wekan, an open-source kanban board system widely used for task and project management. The issue exists in all versions up to 18.15 and was resolved in version 18.16. The root cause is the absence of proper server-side authorization checks when authenticated users attempt to update their user documents. Normally, users should only be able to modify limited profile fields; however, due to this flaw, they can alter the entire user document, including sensitive attributes such as organizational affiliations (orgs/teams) and the loginDisabled flag. This unauthorized modification capability allows attackers to escalate privileges by assigning themselves to other teams or organizations, or by re-enabling disabled accounts, thereby gaining unauthorized access to resources and data across different organizational boundaries. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only needs privileges of an authenticated user (PR:L) without any user interaction (UI:N). The impact spans confidentiality, integrity, and availability (C:H/I:H/A:H), as attackers can access sensitive data, manipulate user roles, and potentially disrupt operations. Although no exploits are currently known in the wild, the severity and ease of exploitation make this a significant threat. The CWE classification is CWE-284 (Improper Access Control), highlighting the failure to enforce proper authorization. Organizations relying on Wekan for collaboration and project tracking should prioritize upgrading to version 18.16 or later to remediate this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-65780 can be substantial, particularly for those using Wekan in environments with multiple teams or organizational units. Unauthorized privilege escalation can lead to data breaches, exposing sensitive project information and internal communications. Attackers could manipulate team memberships to access confidential tasks or documents, undermining confidentiality. Integrity is compromised as unauthorized users can alter project data or user statuses, potentially disrupting workflows or causing operational confusion. Availability may also be affected if attackers disable legitimate user accounts or manipulate access controls, leading to denial of service for legitimate users. Given the collaborative nature of Wekan, such breaches could cascade into broader organizational risks, including regulatory compliance violations under GDPR if personal or sensitive data is exposed. The risk is amplified in sectors with strict data protection requirements such as finance, healthcare, and government institutions across Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade Wekan installations to version 18.16 or later, where the authorization checks have been properly implemented. Until patching is complete, restrict access to Wekan to trusted users only and review user privileges to ensure minimal necessary access. Implement network-level controls such as VPNs or IP whitelisting to limit exposure. Conduct thorough audits of user accounts and organizational memberships to detect any unauthorized changes. Employ monitoring and alerting for unusual user document modifications or privilege escalations. Additionally, enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of compromised credentials. Regularly review and update access control policies to ensure they align with the principle of least privilege. Finally, educate users about the importance of reporting suspicious activity promptly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 694017f1d9bcdf3f3ddec58f
Added to database: 12/15/2025, 2:15:13 PM
Last enriched: 12/22/2025, 3:37:39 PM
Last updated: 2/7/2026, 6:28:18 AM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
UnknownCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.