Impact
The setBoardOrgs API endpoint in WeKan’s REST interface accepts payloads that include the fields item.cardId, item.checklistId, and card.boardId. Because the server does not properly validate the caller’s authorization for these fields, a crafted request can cause the platform to modify board or organizational data that the attacker should not control. This failure of access control allows a remote actor to elevate privileges and manipulate content within the application.
Affected Systems
WeKan, the task‑management web application, is affected in all releases up to and including 8.20. The vulnerability was addressed in release 8.21, which incorporates the patch commit cabfeed9a68e21c469bf206d8655941444b9912c. No other vendors or products are listed as impacted.
Risk and Exploitability
The CVSS score of 2.3 indicates a low severity, and the EPSS rating of less than 1% denotes a very small likelihood of exploitation in the wild. The vulnerability is remote but requires high complexity and is reported as difficult to exploit. It is not currently listed in the CISA KEV catalog, which further suggests that it is not a widely exploited flaw at present.
OpenCVE Enrichment