Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1892: Improper Authorization in WeKan

0
Low
VulnerabilityCVE-2026-1892cvecve-2026-1892
Published: Wed Feb 04 2026 (02/04/2026, 22:02:10 UTC)
Source: CVE Database V5
Product: WeKan

Description

A security vulnerability has been detected in WeKan up to 8.20. This affects the function setBoardOrgs of the file models/boards.js of the component REST API. Such manipulation of the argument item.cardId/item.checklistId/card.boardId leads to improper authorization. The attack may be launched remotely. A high complexity level is associated with this attack. The exploitability is reported as difficult. Upgrading to version 8.21 mitigates this issue. The name of the patch is cabfeed9a68e21c469bf206d8655941444b9912c. It is suggested to upgrade the affected component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:59:17 UTC

Technical Analysis

CVE-2026-1892 identifies an improper authorization vulnerability in the open-source project management tool WeKan, specifically in versions 8.0 through 8.20. The vulnerability exists in the REST API component, within the setBoardOrgs function located in the models/boards.js file. It stems from insufficient authorization checks when processing certain arguments—namely item.cardId, item.checklistId, and card.boardId. An attacker can manipulate these parameters remotely to perform unauthorized actions or access resources they should not have permission to. The attack complexity is high, indicating that successful exploitation requires detailed knowledge of the API and the application’s internal logic. The vulnerability does not require user interaction and can be attempted with low privileges, but the exploitability is considered difficult. The CVSS 4.0 base score is 2.3, reflecting a low severity due to limited impact and exploitation challenges. The vulnerability affects confidentiality, integrity, and availability at a low level and does not involve scope changes or privilege escalation beyond low privileges. No known exploits have been observed in the wild. The issue is addressed in WeKan version 8.21 by applying patch cabfeed9a68e21c469bf206d8655941444b9912c, which strengthens authorization checks in the affected function. Organizations running vulnerable versions should upgrade promptly to mitigate risk.

Potential Impact

The improper authorization vulnerability could allow attackers to access or modify board-related data in WeKan without proper permissions, potentially exposing sensitive project management information or disrupting workflows. While the impact on confidentiality, integrity, and availability is limited due to the complexity and difficulty of exploitation, unauthorized access could lead to data leakage or unauthorized changes within project boards. This could undermine trust in the project management process and cause operational disruptions. Since WeKan is often used by organizations for collaborative task and project management, any unauthorized access could affect internal communications and project tracking. However, the low CVSS score and absence of known exploits suggest the immediate risk is low. Organizations with sensitive or critical project data should still consider the vulnerability significant enough to warrant prompt remediation to avoid potential targeted attacks.

Mitigation Recommendations

To mitigate CVE-2026-1892, organizations should upgrade all WeKan instances to version 8.21 or later, which includes the official patch (cabfeed9a68e21c469bf206d8655941444b9912c) that corrects the authorization logic in the setBoardOrgs function. Additionally, administrators should audit API access logs for unusual or unauthorized activity related to board or card modifications. Implement network-level restrictions to limit access to the WeKan REST API only to trusted users and systems. Employ strong authentication and role-based access controls within WeKan to minimize the risk of low-privilege accounts being exploited. Regularly review and update permissions assigned to users and API clients to ensure least privilege principles. If upgrading immediately is not feasible, consider temporarily disabling or restricting the affected API endpoints to reduce exposure. Finally, monitor security advisories from the WeKan project and related vulnerability databases for any updates or emerging exploit reports.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-04T14:33:34.302Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6983c4edf9fa50a62fb05c77

Added to database: 2/4/2026, 10:15:09 PM

Last enriched: 2/23/2026, 9:59:17 PM

Last updated: 3/21/2026, 11:43:41 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses