Impact
A missing authorization check in the WeKan Rules Handler component allows remote attackers to manipulate the /publications/rules endpoint without authentication. The vulnerability does not disclose arbitrary code execution; it simply permits unauthorized interaction with the rules data, potentially affecting the integrity and behavior of the application.
Affected Systems
WeKan Project’s WeKan application versions up to 8.20 are affected, specifically the server/publications/rules.js file. The vendor recommends upgrading to version 8.21 to eliminate the issue.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can initiate the exploit remotely over HTTP without prior authentication, making the risk moderate but actionable.
OpenCVE Enrichment