CVE-2026-2209: Improper Authorization in WeKan
A vulnerability was detected in WeKan up to 8.18. The affected element is the function setCreateTranslation of the file client/components/settings/translationBody.js of the component Custom Translation Handler. The manipulation results in improper authorization. The attack can be launched remotely. Upgrading to version 8.19 is sufficient to fix this issue. The patch is identified as f244a43771f6ebf40218b83b9f46dba6b940d7de. It is suggested to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2026-2209 is an improper authorization vulnerability identified in the open-source project WeKan, specifically affecting versions 8.0 through 8.18. The vulnerability resides in the setCreateTranslation function within the client/components/settings/translationBody.js file, part of the Custom Translation Handler component. This flaw allows an attacker to remotely manipulate translation creation or modification processes without proper authorization checks. The vulnerability does not require user interaction and can be exploited by an attacker with limited privileges (PR:L), indicating that an attacker must have some level of authenticated access but not administrative rights. The CVSS 4.0 base score is 5.3, reflecting a medium severity due to the ease of exploitation (low attack complexity), network attack vector, and the impact on confidentiality, integrity, and availability being limited but present. The vulnerability does not involve scope changes or security controls bypass beyond authorization. The patch, identified by commit f244a43771f6ebf40218b83b9f46dba6b940d7de, fixes the authorization logic to ensure only authorized users can invoke setCreateTranslation functionality. No known exploits have been reported in the wild as of the publication date. The vulnerability highlights the importance of strict authorization checks in multi-tenant or collaborative software environments like WeKan, which is used for kanban-style project management and task tracking.
Potential Impact
The vulnerability allows an attacker with limited privileges to perform unauthorized actions related to translation creation or modification within WeKan. This can lead to unauthorized changes in the user interface language or content, potentially causing confusion, misinformation, or manipulation of displayed information. While the impact on confidentiality, integrity, and availability is limited, unauthorized modifications could undermine trust in the system and disrupt collaboration workflows. In environments where WeKan is used for critical project management or sensitive information tracking, this could lead to operational disruptions or indirect information disclosure. The remote exploitability and lack of required user interaction increase the risk of automated or targeted attacks. Organizations relying on WeKan for internal or external collaboration should consider this vulnerability a moderate risk until patched.
Mitigation Recommendations
The primary mitigation is to upgrade WeKan installations to version 8.19 or later, where the authorization flaw in setCreateTranslation has been corrected. Until upgrading is possible, organizations should restrict access to WeKan to trusted users only and enforce the principle of least privilege to minimize the number of users with permissions that could exploit this vulnerability. Monitoring and logging of translation-related activities can help detect suspicious behavior. Additionally, network-level controls such as IP whitelisting or VPN access can reduce exposure. Administrators should review user roles and permissions to ensure no unnecessary privileges are granted. Regularly auditing and updating software dependencies and components is essential to prevent similar authorization issues. Finally, educating users about the importance of reporting unexpected UI changes or translation anomalies can aid early detection.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Sweden, Japan, South Korea
CVE-2026-2209: Improper Authorization in WeKan
Description
A vulnerability was detected in WeKan up to 8.18. The affected element is the function setCreateTranslation of the file client/components/settings/translationBody.js of the component Custom Translation Handler. The manipulation results in improper authorization. The attack can be launched remotely. Upgrading to version 8.19 is sufficient to fix this issue. The patch is identified as f244a43771f6ebf40218b83b9f46dba6b940d7de. It is suggested to upgrade the affected component.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2209 is an improper authorization vulnerability identified in the open-source project WeKan, specifically affecting versions 8.0 through 8.18. The vulnerability resides in the setCreateTranslation function within the client/components/settings/translationBody.js file, part of the Custom Translation Handler component. This flaw allows an attacker to remotely manipulate translation creation or modification processes without proper authorization checks. The vulnerability does not require user interaction and can be exploited by an attacker with limited privileges (PR:L), indicating that an attacker must have some level of authenticated access but not administrative rights. The CVSS 4.0 base score is 5.3, reflecting a medium severity due to the ease of exploitation (low attack complexity), network attack vector, and the impact on confidentiality, integrity, and availability being limited but present. The vulnerability does not involve scope changes or security controls bypass beyond authorization. The patch, identified by commit f244a43771f6ebf40218b83b9f46dba6b940d7de, fixes the authorization logic to ensure only authorized users can invoke setCreateTranslation functionality. No known exploits have been reported in the wild as of the publication date. The vulnerability highlights the importance of strict authorization checks in multi-tenant or collaborative software environments like WeKan, which is used for kanban-style project management and task tracking.
Potential Impact
The vulnerability allows an attacker with limited privileges to perform unauthorized actions related to translation creation or modification within WeKan. This can lead to unauthorized changes in the user interface language or content, potentially causing confusion, misinformation, or manipulation of displayed information. While the impact on confidentiality, integrity, and availability is limited, unauthorized modifications could undermine trust in the system and disrupt collaboration workflows. In environments where WeKan is used for critical project management or sensitive information tracking, this could lead to operational disruptions or indirect information disclosure. The remote exploitability and lack of required user interaction increase the risk of automated or targeted attacks. Organizations relying on WeKan for internal or external collaboration should consider this vulnerability a moderate risk until patched.
Mitigation Recommendations
The primary mitigation is to upgrade WeKan installations to version 8.19 or later, where the authorization flaw in setCreateTranslation has been corrected. Until upgrading is possible, organizations should restrict access to WeKan to trusted users only and enforce the principle of least privilege to minimize the number of users with permissions that could exploit this vulnerability. Monitoring and logging of translation-related activities can help detect suspicious behavior. Additionally, network-level controls such as IP whitelisting or VPN access can reduce exposure. Administrators should review user roles and permissions to ensure no unnecessary privileges are granted. Regularly auditing and updating software dependencies and components is essential to prevent similar authorization issues. Finally, educating users about the importance of reporting unexpected UI changes or translation anomalies can aid early detection.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-08T01:14:09.539Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6987ee2cf9fa50a62f16ffc4
Added to database: 2/8/2026, 2:00:12 AM
Last enriched: 2/23/2026, 9:08:31 PM
Last updated: 3/26/2026, 3:53:36 AM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.