CVE-2026-1895: Improper Access Controls in WeKan
CVE-2026-1895 is a medium-severity vulnerability in WeKan versions up to 8. 20, involving improper access controls in the applyWipLimit function within the Attachment Storage Handler component. The flaw allows remote attackers with limited privileges to manipulate access controls, potentially leading to unauthorized actions or data exposure. Exploitation does not require user interaction or elevated privileges beyond limited access, and no authentication bypass is indicated. The vulnerability is fixed in WeKan version 8. 21. European organizations using affected WeKan versions should prioritize upgrading to mitigate risks. The vulnerability’s medium CVSS score (5. 3) reflects moderate impact and ease of exploitation. Countries with significant adoption of WeKan, especially in public sector and collaborative environments, are at higher risk.
AI Analysis
Technical Summary
CVE-2026-1895 identifies an improper access control vulnerability in the open-source project management tool WeKan, specifically affecting versions 8.0 through 8.20. The flaw resides in the applyWipLimit function within the models/lists.js file, part of the Attachment Storage Handler component. This function is responsible for enforcing work-in-progress limits on lists, but due to insufficient access control checks, an attacker with limited privileges can remotely manipulate these controls. This manipulation could allow unauthorized modification of list limits or attachment-related data, potentially leading to unauthorized access or data integrity issues. The vulnerability does not require user interaction or elevated privileges beyond limited access, making it easier to exploit remotely over the network. The issue was addressed in version 8.21 by patch 8c0b4f79d8582932528ec2fdf2a4487c86770fb9, which strengthens access control checks in the affected function. No known exploits are currently reported in the wild, but the vulnerability’s presence in a widely used collaboration tool poses a risk if left unpatched. The CVSS 4.0 base score of 5.3 reflects a medium severity, considering network attack vector, low attack complexity, no required authentication, and limited impact on confidentiality, integrity, and availability. Organizations relying on WeKan for project management and collaboration should assess their exposure and apply the patch promptly to prevent potential exploitation.
Potential Impact
For European organizations, the vulnerability could lead to unauthorized modification of project management data, potentially disrupting workflows, exposing sensitive project information, or corrupting data integrity. Since WeKan is often used in collaborative environments, improper access controls could allow attackers to bypass intended restrictions, impacting confidentiality and integrity of project attachments and list limits. This could result in operational disruptions, loss of trust in project data, and potential compliance issues if sensitive data is exposed. The remote exploitability without user interaction increases the risk of automated attacks. While the impact on availability is limited, the integrity and confidentiality risks are significant enough to warrant prompt remediation. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, may face heightened risks and regulatory scrutiny if this vulnerability is exploited.
Mitigation Recommendations
The primary mitigation is to upgrade WeKan installations to version 8.21 or later, which contains the patch fixing the improper access control issue. Organizations should verify the version of WeKan in use and prioritize patch deployment. Beyond patching, administrators should review and tighten access control policies related to list and attachment management to ensure least privilege principles are enforced. Implement network segmentation and firewall rules to restrict access to WeKan instances to trusted users and networks. Enable detailed logging and monitoring of attachment handling and list modifications to detect anomalous activities indicative of exploitation attempts. Conduct regular security audits and penetration testing focusing on access control mechanisms within WeKan. Additionally, educate users about the importance of reporting unexpected behavior in project management tools. For organizations using containerized or cloud deployments of WeKan, ensure that the underlying infrastructure is also secured and updated.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Denmark
CVE-2026-1895: Improper Access Controls in WeKan
Description
CVE-2026-1895 is a medium-severity vulnerability in WeKan versions up to 8. 20, involving improper access controls in the applyWipLimit function within the Attachment Storage Handler component. The flaw allows remote attackers with limited privileges to manipulate access controls, potentially leading to unauthorized actions or data exposure. Exploitation does not require user interaction or elevated privileges beyond limited access, and no authentication bypass is indicated. The vulnerability is fixed in WeKan version 8. 21. European organizations using affected WeKan versions should prioritize upgrading to mitigate risks. The vulnerability’s medium CVSS score (5. 3) reflects moderate impact and ease of exploitation. Countries with significant adoption of WeKan, especially in public sector and collaborative environments, are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-1895 identifies an improper access control vulnerability in the open-source project management tool WeKan, specifically affecting versions 8.0 through 8.20. The flaw resides in the applyWipLimit function within the models/lists.js file, part of the Attachment Storage Handler component. This function is responsible for enforcing work-in-progress limits on lists, but due to insufficient access control checks, an attacker with limited privileges can remotely manipulate these controls. This manipulation could allow unauthorized modification of list limits or attachment-related data, potentially leading to unauthorized access or data integrity issues. The vulnerability does not require user interaction or elevated privileges beyond limited access, making it easier to exploit remotely over the network. The issue was addressed in version 8.21 by patch 8c0b4f79d8582932528ec2fdf2a4487c86770fb9, which strengthens access control checks in the affected function. No known exploits are currently reported in the wild, but the vulnerability’s presence in a widely used collaboration tool poses a risk if left unpatched. The CVSS 4.0 base score of 5.3 reflects a medium severity, considering network attack vector, low attack complexity, no required authentication, and limited impact on confidentiality, integrity, and availability. Organizations relying on WeKan for project management and collaboration should assess their exposure and apply the patch promptly to prevent potential exploitation.
Potential Impact
For European organizations, the vulnerability could lead to unauthorized modification of project management data, potentially disrupting workflows, exposing sensitive project information, or corrupting data integrity. Since WeKan is often used in collaborative environments, improper access controls could allow attackers to bypass intended restrictions, impacting confidentiality and integrity of project attachments and list limits. This could result in operational disruptions, loss of trust in project data, and potential compliance issues if sensitive data is exposed. The remote exploitability without user interaction increases the risk of automated attacks. While the impact on availability is limited, the integrity and confidentiality risks are significant enough to warrant prompt remediation. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, may face heightened risks and regulatory scrutiny if this vulnerability is exploited.
Mitigation Recommendations
The primary mitigation is to upgrade WeKan installations to version 8.21 or later, which contains the patch fixing the improper access control issue. Organizations should verify the version of WeKan in use and prioritize patch deployment. Beyond patching, administrators should review and tighten access control policies related to list and attachment management to ensure least privilege principles are enforced. Implement network segmentation and firewall rules to restrict access to WeKan instances to trusted users and networks. Enable detailed logging and monitoring of attachment handling and list modifications to detect anomalous activities indicative of exploitation attempts. Conduct regular security audits and penetration testing focusing on access control mechanisms within WeKan. Additionally, educate users about the importance of reporting unexpected behavior in project management tools. For organizations using containerized or cloud deployments of WeKan, ensure that the underlying infrastructure is also secured and updated.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-04T14:46:21.963Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6983d2fdf9fa50a62fb34813
Added to database: 2/4/2026, 11:15:09 PM
Last enriched: 2/4/2026, 11:29:28 PM
Last updated: 2/5/2026, 2:14:46 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumCVE-2026-1896: Improper Access Controls in WeKan
MediumCVE-2025-13192: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighCVE-2025-22873: CWE-23: Relative Path Traversal in Go standard library os
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.