Description
A vulnerability was determined in WeKan up to 8.20. This impacts an unknown function of the file models/boards.js of the component REST Endpoint. This manipulation causes improper access controls. Remote exploitation of the attack is possible. Upgrading to version 8.21 will fix this issue. Patch name: 545566f5663545d16174e0f2399f231aa693ab6e. It is advisable to upgrade the affected component.
Published: 2026-02-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access via Improper Access Control
Action: Patch Now
AI Analysis

Impact

A vulnerability exists in the WeKan application up to version 8.20 in the REST Endpoint defined in models/boards.js. The flaw occurs when an attacker manipulates a known or unknown function related to board titles, leading to improper access control enforcement. Because the authorization check is bypassed, a remote attacker can read or modify board titles belonging to other users. This is a classic access control issue (CWE-266, CWE-284).

Affected Systems

The affected product is the WeKan project application. All releases through 8.20 are vulnerable. An update to v8.21 includes the patch commit 545566f5663545d16174e0f2399f231aa693ab6e and resolves the problem.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1 percent suggests a low current exploitation probability. The vulnerability is not listed in the KEV catalog. Exploitation requires the ability to send crafted REST requests to the affected endpoints; an attacker who can reach the server can remotely trigger the flaw. Due to the low EPSS and lack of known exploits, the risk is moderate but should still be addressed.

Generated by OpenCVE AI on April 17, 2026 at 22:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to version 8.21 or later to receive the security fix.
  • If upgrading immediately is infeasible, restrict or temporarily disable access to the vulnerable REST API endpoints that expose board titles to prevent unauthorized manipulation.
  • Audit and enforce proper role‑based access controls so that only authorized users can change board titles, aligning the implementation with best practices for authorization.
  • Monitor the application for any anomalous activity that might indicate exploitation of the flaw.

Generated by OpenCVE AI on April 17, 2026 at 22:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:*

Fri, 06 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wekan Project
Wekan Project wekan
Vendors & Products Wekan Project
Wekan Project wekan

Thu, 05 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in WeKan up to 8.20. This impacts an unknown function of the file models/boards.js of the component REST Endpoint. This manipulation causes improper access controls. Remote exploitation of the attack is possible. Upgrading to version 8.21 will fix this issue. Patch name: 545566f5663545d16174e0f2399f231aa693ab6e. It is advisable to upgrade the affected component.
Title WeKan REST Endpoint boards.js BoardTitleRESTBleed access control
Weaknesses CWE-266
CWE-284
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:ND/RL:OF/RC:C'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:X/RL:O/RC:C'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:X/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Wekan Project Wekan
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:18:36.178Z

Reserved: 2026-02-05T10:51:38.575Z

Link: CVE-2026-1964

cve-icon Vulnrichment

Updated: 2026-02-06T20:29:13.199Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-05T22:15:53.713

Modified: 2026-02-12T17:29:49.317

Link: CVE-2026-1964

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:00:12Z

Weaknesses