Impact
A flaw in the LDAP User Sync component of WeKan allows improper access controls in the syncUser.js module, enabling remote actors to manipulate user synchronization. The vulnerability can lead to unauthorized access or modification of user accounts, exposing sensitive information and compromising data integrity.
Affected Systems
The issue exists in WeKan up to version 8.20, specifically within packages/wekan-ldap/server/syncUser.js of the LDAP User Sync component. All releases prior to 8.21 are affected. Users running WeKan 8.21 or later are not susceptible to this flaw.
Risk and Exploitability
The flaw carries a CVSS score of 5.3, indicating medium severity, and an EPSS probability of less than 1 %. It is not listed in the CISA KEV catalog. Attackers can exploit the weakness remotely through the LDAP sync API; the CVE data does not explicitly state whether authentication is required, so it is inferred that inadequate authorization checks could allow such exploitation.
OpenCVE Enrichment