Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1962: Improper Access Controls in WeKan

0
Medium
VulnerabilityCVE-2026-1962cvecve-2026-1962
Published: Thu Feb 05 2026 (02/05/2026, 20:32:08 UTC)
Source: CVE Database V5
Product: WeKan

Description

A vulnerability has been found in WeKan up to 8.20. The impacted element is an unknown function of the file server/attachmentMigration.js of the component Attachment Migration. The manipulation leads to improper access controls. The attack may be initiated remotely. Upgrading to version 8.21 is sufficient to resolve this issue. The identifier of the patch is 053bf1dfb76ef230db162c64a6ed50ebedf67eee. It is recommended to upgrade the affected component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:00:38 UTC

Technical Analysis

CVE-2026-1962 is a vulnerability identified in the open-source project management tool WeKan, affecting all versions from 8.0 through 8.20. The issue resides in an unspecified function within the server-side file server/attachmentMigration.js, part of the Attachment Migration component. The root cause is improper access control, which allows remote attackers to bypass intended restrictions and access or manipulate attachments improperly. The vulnerability can be exploited remotely without user interaction and does not require prior authentication, though it does require low privileges (PR:L). The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and limited impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The flaw does not affect system scope or require special privileges beyond low-level access. The vendor has addressed the issue in WeKan version 8.21, with a patch identified by commit 053bf1dfb76ef230db162c64a6ed50ebedf67eee. No public exploits or widespread attacks have been reported to date. This vulnerability could allow unauthorized access to sensitive attachments, potentially exposing confidential project information or enabling data tampering.

Potential Impact

The vulnerability's impact primarily concerns unauthorized access to attachments managed by WeKan, which could lead to exposure of sensitive project data, intellectual property, or personally identifiable information. Integrity could be compromised if attackers modify attachments, potentially disrupting project workflows or injecting malicious content. Availability impact is limited but possible if attackers manipulate attachments to cause application errors or denial of service. Since exploitation requires only low privileges and no user interaction, attackers with minimal access could leverage this flaw to escalate their impact within the system. Organizations relying on WeKan for collaborative project management, especially in sectors handling sensitive or regulated data, face risks of data breaches, compliance violations, and operational disruptions. The medium severity rating indicates a moderate but non-trivial threat that warrants timely remediation.

Mitigation Recommendations

Organizations should upgrade all affected WeKan instances to version 8.21 or later immediately to remediate the vulnerability. In addition to patching, administrators should review and tighten access control policies around attachments and migration processes to ensure least privilege principles are enforced. Monitoring logs for unusual access patterns to attachment migration endpoints can help detect attempted exploitation. Implement network segmentation and firewall rules to restrict access to WeKan servers, limiting exposure to trusted users and networks. Regularly audit user privileges and remove unnecessary low-level access that could be leveraged by attackers. Employ secure coding and configuration management practices to prevent similar access control issues in custom deployments or integrations. Finally, maintain an incident response plan to quickly address any suspected compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-05T10:51:22.769Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69850155f9fa50a62f38ceec

Added to database: 2/5/2026, 8:45:09 PM

Last enriched: 2/23/2026, 10:00:38 PM

Last updated: 3/23/2026, 1:57:58 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses