Description
A vulnerability was found in WeKan up to 8.20. This affects an unknown function of the file models/attachments.js of the component Attachment Storage. The manipulation results in improper access controls. The attack may be launched remotely. Upgrading to version 8.21 mitigates this issue. The patch is identified as c413a7e860bc4d93fe2adcf82516228570bf382d. Upgrading the affected component is advised.
Published: 2026-02-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper access controls
Action: Patch
AI Analysis

Impact

A flaw in the Attachment Storage component of WeKan allows an attacker to bypass authorization checks for handling attachments. The vulnerability exists in the models/attachments.js module and can be triggered by manipulating requests, enabling unauthorized reading, uploading or deletion of attachments. This weakness aligns with CWE-266 and CWE-284 and threatens the confidentiality and integrity of stored attachments. Because the description indicates the attack may be launched remotely, an attacker only needs to send crafted traffic to a vulnerable WeKan instance.

Affected Systems

Versions of WeKan up to and including 8.20 are affected. The vendor addressed the flaw in release 8.21, with the patch identified by commit c413a7e860bc4d93fe2adcf82516228570bf382d. All installations running 8.20 or earlier are vulnerable and the issue is confined to the Attachment Storage component.

Risk and Exploitability

The CVSS base score of 5.3 classifies the issue as medium severity, while an EPSS score below 1% indicates a low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is remote, involving a specially crafted request to the attachments endpoint, which could allow an attacker to access or modify confidential attachments.

Generated by OpenCVE AI on April 17, 2026 at 22:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WeKan to version 8.21 or later to receive the fixed attachment handling logic.
  • If an upgrade is not immediately possible, apply the patch commit c413a7e860bc4d93fe2adcf82516228570bf382d to the affected file.
  • Implement network controls to restrict external access to the attachments endpoint, such as firewall rules or placing the application behind an authentication gateway.

Generated by OpenCVE AI on April 17, 2026 at 22:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:*

Thu, 12 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wekan Project
Wekan Project wekan
Vendors & Products Wekan Project
Wekan Project wekan

Thu, 05 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in WeKan up to 8.20. This affects an unknown function of the file models/attachments.js of the component Attachment Storage. The manipulation results in improper access controls. The attack may be launched remotely. Upgrading to version 8.21 mitigates this issue. The patch is identified as c413a7e860bc4d93fe2adcf82516228570bf382d. Upgrading the affected component is advised.
Title WeKan Attachment Storage attachments.js MoveStorageBleed access control
Weaknesses CWE-266
CWE-284
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Wekan Project Wekan
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:18:23.272Z

Reserved: 2026-02-05T10:51:34.836Z

Link: CVE-2026-1963

cve-icon Vulnrichment

Updated: 2026-02-12T15:11:40.517Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-05T21:15:53.180

Modified: 2026-03-06T21:50:55.710

Link: CVE-2026-1963

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:00:12Z

Weaknesses