Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2205: Information Disclosure in WeKan

0
Medium
VulnerabilityCVE-2026-2205cvecve-2026-2205
Published: Sun Feb 08 2026 (02/08/2026, 01:09:32 UTC)
Source: CVE Database V5
Product: WeKan

Description

A vulnerability was identified in WeKan up to 8.20. This affects an unknown part of the file server/publications/cards.js of the component Meteor Publication Handler. Such manipulation leads to information disclosure. The attack may be performed from remote. Upgrading to version 8.21 is able to mitigate this issue. The name of the patch is 0f5a9c38778ca550cbab6c5093470e1e90cb837f. Upgrading the affected component is advised.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:07:21 UTC

Technical Analysis

CVE-2026-2205 is a medium-severity information disclosure vulnerability affecting WeKan, an open-source kanban board application widely used for project management. The vulnerability resides in the Meteor Publication Handler component, specifically in the file server/publications/cards.js, which handles data publications to clients. Due to improper access control or data filtering, an attacker can remotely manipulate requests to retrieve information that should be restricted, leading to unauthorized data exposure. The vulnerability affects all WeKan versions from 8.0 through 8.20. The attack vector is network-based, requiring no authentication or user interaction, and has low attack complexity, making it relatively easy to exploit if the attacker can reach the service. The impact is limited to confidentiality, with no direct effect on integrity or availability. The vulnerability was publicly disclosed on February 8, 2026, and a patch was released in version 8.21, identified by commit 0f5a9c38778ca550cbab6c5093470e1e90cb837f. No known exploits have been reported in the wild, but the potential for information leakage could expose sensitive project data or internal communications. Organizations using WeKan should upgrade promptly to mitigate this risk.

Potential Impact

The primary impact of CVE-2026-2205 is unauthorized disclosure of potentially sensitive information managed within WeKan instances. This can include project details, task statuses, user information, and other confidential data stored or displayed on kanban boards. For organizations relying on WeKan for internal project management, such leaks could lead to competitive disadvantage, loss of intellectual property confidentiality, or exposure of sensitive operational details. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone can have serious reputational and operational consequences. The ease of remote exploitation without authentication increases the risk, especially for publicly accessible WeKan deployments. Since no exploits are currently known in the wild, the threat is moderate but could escalate if attackers develop automated tools. Organizations with regulatory compliance requirements around data privacy may face additional legal and compliance risks if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2026-2205, organizations should immediately upgrade all affected WeKan instances to version 8.21 or later, which contains the official patch (commit 0f5a9c38778ca550cbab6c5093470e1e90cb837f) addressing the vulnerability. In addition to patching, administrators should restrict network access to WeKan servers by implementing firewall rules or VPN access to limit exposure to trusted users only. Conduct a thorough audit of current WeKan deployments to identify any publicly accessible instances and apply access controls accordingly. Monitor logs for unusual access patterns or data requests that could indicate exploitation attempts. If upgrading is temporarily not possible, consider disabling or restricting the Meteor Publication Handler component or the affected publications, if feasible, to reduce exposure. Regularly review and update user permissions within WeKan to enforce the principle of least privilege. Finally, maintain an incident response plan to quickly address any suspected data disclosure incidents related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-08T01:06:02.995Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6987ee2cf9fa50a62f16ffa4

Added to database: 2/8/2026, 2:00:12 AM

Last enriched: 2/23/2026, 9:07:21 PM

Last updated: 3/24/2026, 10:30:39 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses