Impact
A flaw in WeKan's REST API, specifically within models/checklistItems.js, allows an attacker to manipulate the parameters item.cardId, item.checklistId, and card.boardId. This improper authorization check lets unauthenticated or insufficiently privileged users access or alter checklist items beyond their intended scope. The vulnerability triggers when the API processes the crafted request, resulting in potential data leakage or unauthorized modifications.
Affected Systems
The issue affects all WeKan installations running versions up to 8.20. The affected component is the REST API endpoint for checklist items. Version 8.21 and later contain a patch (commit 251d49eea94834cf351bb395808f4a56fb4dbb44) that resolves the authorization bypass.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate potential impact. EPSS is below 1%, suggesting a low likelihood of current exploitation, yet the vulnerability is remotely exploitable via the public API. The lack of authentication checks implies that an attacker could craft API requests from any host if the server exposes the endpoint. The vulnerability is not listed in KEV, but administrators should still prioritize patching to avoid possible data exposure.
OpenCVE Enrichment