Description
A vulnerability was found in WeKan up to 8.20. Affected by this issue is some unknown functionality of the file server/methods/positionHistory.js of the component Position-History Tracking. The manipulation results in missing authorization. The attack may be performed from remote. Upgrading to version 8.21 can resolve this issue. The patch is identified as 55576ec17722db094835470b386162c9a662fb60. It is advisable to upgrade the affected component.
Published: 2026-02-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access to position history data
Action: Immediate Patch
AI Analysis

Impact

A missing authorization check in the Position‑History Tracking component of WeKan allows an attacker to manipulate history data without proper credentials. The flaw is documented as a breach of authorization and an absence of required access controls (CWE-862, CWE-863). An attacker who exploits this could read or alter position history records, potentially leaking sensitive user activity or corrupting task timelines.

Affected Systems

The vulnerability affects the WeKan platform up to version 8.20, specifically the server/methods/positionHistory.js file in the Position‑History Tracking module. Installing WeKan 8.21 or newer removes the vulnerability.

Risk and Exploitability

The CVSS base score is 5.3, indicating moderate impact. The EPSS score is less than 1 %, suggesting a low probability of exploitation at present, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. An attacker can reach the affected endpoint remotely and perform the flaw without needing privileged credentials, making the attack vector remote.

Generated by OpenCVE AI on April 18, 2026 at 18:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WeKan to the 8.21 release or later to apply the vendor‑provided fix.
  • If upgrading cannot be performed immediately, apply the patch commit 55576ec17722db094835470b386162c9a662fb60 to the server/methods/positionHistory.js file.
  • Restrict access to the Position‑History Tracking endpoints to authorized users via network controls or application role permissions until a fix is in place.

Generated by OpenCVE AI on April 18, 2026 at 18:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:*

Thu, 05 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Feb 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Wekan Project
Wekan Project wekan
Vendors & Products Wekan Project
Wekan Project wekan

Thu, 05 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in WeKan up to 8.20. Affected by this issue is some unknown functionality of the file server/methods/positionHistory.js of the component Position-History Tracking. The manipulation results in missing authorization. The attack may be performed from remote. Upgrading to version 8.21 can resolve this issue. The patch is identified as 55576ec17722db094835470b386162c9a662fb60. It is advisable to upgrade the affected component.
Title WeKan Position-History Tracking positionHistory.js PositionHistoryBleed authorization
Weaknesses CWE-862
CWE-863
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:P/I:N/A:N/E:ND/RL:OF/RC:C'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:X/RL:O/RC:C'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:X/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Wekan Project Wekan
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:17:43.503Z

Reserved: 2026-02-04T14:46:27.111Z

Link: CVE-2026-1897

cve-icon Vulnrichment

Updated: 2026-02-05T15:45:06.807Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-05T01:15:52.450

Modified: 2026-02-10T17:47:03.330

Link: CVE-2026-1897

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:30:07Z

Weaknesses