CVE-2026-1892: Improper Authorization in WeKan
A security vulnerability has been detected in WeKan up to 8.20. This affects the function setBoardOrgs of the file models/boards.js of the component REST API. Such manipulation of the argument item.cardId/item.checklistId/card.boardId leads to improper authorization. The attack may be launched remotely. A high complexity level is associated with this attack. The exploitability is reported as difficult. Upgrading to version 8.21 mitigates this issue. The name of the patch is cabfeed9a68e21c469bf206d8655941444b9912c. It is suggested to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2026-1892 identifies an improper authorization vulnerability in the open-source project management tool WeKan, specifically in versions 8.0 through 8.20. The vulnerability exists in the REST API component, within the setBoardOrgs function located in the models/boards.js file. It stems from insufficient authorization checks when processing certain arguments—namely item.cardId, item.checklistId, and card.boardId. An attacker can manipulate these parameters remotely to perform unauthorized actions or access resources they should not have permission to. The attack complexity is high, indicating that successful exploitation requires detailed knowledge of the API and the application’s internal logic. The vulnerability does not require user interaction and can be attempted with low privileges, but the exploitability is considered difficult. The CVSS 4.0 base score is 2.3, reflecting a low severity due to limited impact and exploitation challenges. The vulnerability affects confidentiality, integrity, and availability at a low level and does not involve scope changes or privilege escalation beyond low privileges. No known exploits have been observed in the wild. The issue is addressed in WeKan version 8.21 by applying patch cabfeed9a68e21c469bf206d8655941444b9912c, which strengthens authorization checks in the affected function. Organizations running vulnerable versions should upgrade promptly to mitigate risk.
Potential Impact
The improper authorization vulnerability could allow attackers to access or modify board-related data in WeKan without proper permissions, potentially exposing sensitive project management information or disrupting workflows. While the impact on confidentiality, integrity, and availability is limited due to the complexity and difficulty of exploitation, unauthorized access could lead to data leakage or unauthorized changes within project boards. This could undermine trust in the project management process and cause operational disruptions. Since WeKan is often used by organizations for collaborative task and project management, any unauthorized access could affect internal communications and project tracking. However, the low CVSS score and absence of known exploits suggest the immediate risk is low. Organizations with sensitive or critical project data should still consider the vulnerability significant enough to warrant prompt remediation to avoid potential targeted attacks.
Mitigation Recommendations
To mitigate CVE-2026-1892, organizations should upgrade all WeKan instances to version 8.21 or later, which includes the official patch (cabfeed9a68e21c469bf206d8655941444b9912c) that corrects the authorization logic in the setBoardOrgs function. Additionally, administrators should audit API access logs for unusual or unauthorized activity related to board or card modifications. Implement network-level restrictions to limit access to the WeKan REST API only to trusted users and systems. Employ strong authentication and role-based access controls within WeKan to minimize the risk of low-privilege accounts being exploited. Regularly review and update permissions assigned to users and API clients to ensure least privilege principles. If upgrading immediately is not feasible, consider temporarily disabling or restricting the affected API endpoints to reduce exposure. Finally, monitor security advisories from the WeKan project and related vulnerability databases for any updates or emerging exploit reports.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, India
CVE-2026-1892: Improper Authorization in WeKan
Description
A security vulnerability has been detected in WeKan up to 8.20. This affects the function setBoardOrgs of the file models/boards.js of the component REST API. Such manipulation of the argument item.cardId/item.checklistId/card.boardId leads to improper authorization. The attack may be launched remotely. A high complexity level is associated with this attack. The exploitability is reported as difficult. Upgrading to version 8.21 mitigates this issue. The name of the patch is cabfeed9a68e21c469bf206d8655941444b9912c. It is suggested to upgrade the affected component.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1892 identifies an improper authorization vulnerability in the open-source project management tool WeKan, specifically in versions 8.0 through 8.20. The vulnerability exists in the REST API component, within the setBoardOrgs function located in the models/boards.js file. It stems from insufficient authorization checks when processing certain arguments—namely item.cardId, item.checklistId, and card.boardId. An attacker can manipulate these parameters remotely to perform unauthorized actions or access resources they should not have permission to. The attack complexity is high, indicating that successful exploitation requires detailed knowledge of the API and the application’s internal logic. The vulnerability does not require user interaction and can be attempted with low privileges, but the exploitability is considered difficult. The CVSS 4.0 base score is 2.3, reflecting a low severity due to limited impact and exploitation challenges. The vulnerability affects confidentiality, integrity, and availability at a low level and does not involve scope changes or privilege escalation beyond low privileges. No known exploits have been observed in the wild. The issue is addressed in WeKan version 8.21 by applying patch cabfeed9a68e21c469bf206d8655941444b9912c, which strengthens authorization checks in the affected function. Organizations running vulnerable versions should upgrade promptly to mitigate risk.
Potential Impact
The improper authorization vulnerability could allow attackers to access or modify board-related data in WeKan without proper permissions, potentially exposing sensitive project management information or disrupting workflows. While the impact on confidentiality, integrity, and availability is limited due to the complexity and difficulty of exploitation, unauthorized access could lead to data leakage or unauthorized changes within project boards. This could undermine trust in the project management process and cause operational disruptions. Since WeKan is often used by organizations for collaborative task and project management, any unauthorized access could affect internal communications and project tracking. However, the low CVSS score and absence of known exploits suggest the immediate risk is low. Organizations with sensitive or critical project data should still consider the vulnerability significant enough to warrant prompt remediation to avoid potential targeted attacks.
Mitigation Recommendations
To mitigate CVE-2026-1892, organizations should upgrade all WeKan instances to version 8.21 or later, which includes the official patch (cabfeed9a68e21c469bf206d8655941444b9912c) that corrects the authorization logic in the setBoardOrgs function. Additionally, administrators should audit API access logs for unusual or unauthorized activity related to board or card modifications. Implement network-level restrictions to limit access to the WeKan REST API only to trusted users and systems. Employ strong authentication and role-based access controls within WeKan to minimize the risk of low-privilege accounts being exploited. Regularly review and update permissions assigned to users and API clients to ensure least privilege principles. If upgrading immediately is not feasible, consider temporarily disabling or restricting the affected API endpoints to reduce exposure. Finally, monitor security advisories from the WeKan project and related vulnerability databases for any updates or emerging exploit reports.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-04T14:33:34.302Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6983c4edf9fa50a62fb05c77
Added to database: 2/4/2026, 10:15:09 PM
Last enriched: 2/23/2026, 9:59:17 PM
Last updated: 3/21/2026, 11:43:41 PM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.