Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22788: CWE-306: Missing Authentication for Critical Function in SMEWebify WebErpMesv2

0
High
VulnerabilityCVE-2026-22788cvecve-2026-22788cwe-306
Published: Mon Jan 12 2026 (01/12/2026, 21:40:11 UTC)
Source: CVE Database V5
Vendor/Project: SMEWebify
Product: WebErpMesv2

Description

CVE-2026-22788 is a high-severity vulnerability in SMEWebify's WebErpMesv2 versions prior to 1. 19, where multiple sensitive API endpoints lack authentication. This allows unauthenticated remote attackers to access critical business data such as companies, quotes, orders, tasks, and whiteboards. Attackers can also perform limited write operations, including creating company records and fully manipulating collaboration whiteboards. The vulnerability does not require user interaction or authentication and has a CVSS score of 8. 2, indicating a significant risk to confidentiality and partial impact on integrity. The issue is resolved in version 1. 19. European organizations using affected versions face risks of data exposure and unauthorized data manipulation, especially in manufacturing and resource management sectors. Mitigation involves immediate upgrading to version 1.

AI-Powered Analysis

AILast updated: 01/21/2026, 03:02:10 UTC

Technical Analysis

CVE-2026-22788 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting SMEWebify's WebErpMesv2 product versions earlier than 1.19. WebErpMesv2 is a web-based resource management and manufacturing execution system widely used in industrial environments. The vulnerability arises because multiple sensitive API endpoints are exposed without any authentication middleware, allowing unauthenticated remote attackers to access and interact with critical business data. Specifically, attackers can read sensitive information including company details, quotes, orders, tasks, and whiteboards. Furthermore, the vulnerability permits limited write access, enabling attackers to create new company records and fully manipulate collaboration whiteboards, potentially disrupting business operations and collaboration workflows. The CVSS v3.1 score of 8.2 reflects the vulnerability's ease of exploitation (network accessible, no privileges or user interaction required) and its high impact on confidentiality with partial impact on integrity, while availability remains unaffected. Although no known exploits are reported in the wild yet, the exposure of sensitive business data and the ability to alter collaboration content pose significant risks. The vulnerability was publicly disclosed on January 12, 2026, and fixed in version 1.19 of WebErpMesv2. Organizations running affected versions should prioritize patching to prevent unauthorized data access and manipulation.

Potential Impact

For European organizations, especially those in manufacturing and industrial sectors relying on WebErpMesv2 for resource and execution management, this vulnerability presents a substantial risk. Unauthorized access to sensitive business data such as company records, quotes, and orders can lead to intellectual property theft, competitive disadvantage, and regulatory compliance violations under GDPR due to exposure of potentially personal or sensitive data. The ability to manipulate collaboration whiteboards and create company records can disrupt internal workflows, cause misinformation, and potentially lead to financial losses or operational delays. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely by any attacker scanning for vulnerable endpoints, increasing the attack surface. The lack of availability impact means systems remain operational but compromised in confidentiality and integrity, which can be harder to detect and mitigate. This threat could also facilitate further attacks such as social engineering or supply chain manipulation if attackers leverage the exposed data. The overall impact is high, necessitating urgent remediation to protect business continuity and data privacy.

Mitigation Recommendations

The primary mitigation is to upgrade WebErpMesv2 installations to version 1.19 or later, where authentication middleware properly protects all sensitive API endpoints. Until upgrading is possible, organizations should implement network-level access controls such as IP whitelisting or VPN restrictions to limit exposure of the vulnerable API endpoints to trusted users only. Conduct a thorough audit of API endpoint accessibility and ensure no sensitive endpoints are publicly reachable without authentication. Employ web application firewalls (WAFs) with rules to detect and block unauthorized API access attempts. Monitor logs for unusual access patterns or unauthorized data retrieval and manipulation activities. Educate internal teams about the vulnerability and encourage vigilance for suspicious behavior. Additionally, review and tighten permissions and roles within the application to minimize potential damage from any unauthorized access. Finally, prepare incident response plans to quickly address any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-09T18:27:19.388Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69656d69da2266e8382e9816

Added to database: 1/12/2026, 9:53:45 PM

Last enriched: 1/21/2026, 3:02:10 AM

Last updated: 2/6/2026, 8:06:01 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats