Description
A vulnerability was detected in WeKan up to 8.18. The affected element is the function setCreateTranslation of the file client/components/settings/translationBody.js of the component Custom Translation Handler. The manipulation results in improper authorization. The attack can be launched remotely. Upgrading to version 8.19 is sufficient to fix this issue. The patch is identified as f244a43771f6ebf40218b83b9f46dba6b940d7de. It is suggested to upgrade the affected component.
Published: 2026-02-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper Authorization
Action: Patch
AI Analysis

Impact

The flaw lies in the setCreateTranslation function within the Custom Translation component of WeKan. A remote attacker can manipulate this function, bypassing the intended access controls and creating translations without proper authorization. This permits unauthorized users to add or modify translation entries, potentially exposing sensitive information or altering application behavior. The weakness is catalogued as CWE‑266 and CWE‑285, indicating a lack of role‑based access enforcement.

Affected Systems

WeKan versions up to 8.18 are affected. The vendor, WeKan Project, releases the product under the identifier wekan_project:wekan. Upgrading to version 8.19, available through the official release repository, resolves the issue.

Risk and Exploitability

The CVSS score of 5.3 classifies the vulnerability as moderate severity. The EPSS score of less than 1% suggests that exploitation is currently unlikely, and it is not listed in the CISA KEV catalog. However, the attack vector is remote, requiring only network access to the WeKan instance. The proper authorization check is missing, so any authenticated user could potentially trigger the exploit if they have write privileges in the affected component. Consequently, while the likelihood of exploitation remains low, the impact of unauthorized translation creation warrants prompt remediation.

Generated by OpenCVE AI on April 17, 2026 at 22:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WeKan to version 8.19 to install the f244a43771f6ebf40218b83b9f46dba6b940d7de patch
  • Review and tighten role-based access controls so only privileged users can invoke setCreateTranslation
  • Configure application logging and alerts to detect unauthorized attempts to create translations

Generated by OpenCVE AI on April 17, 2026 at 22:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Wekan Project
Wekan Project wekan
Vendors & Products Wekan Project
Wekan Project wekan

Sun, 08 Feb 2026 02:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in WeKan up to 8.18. The affected element is the function setCreateTranslation of the file client/components/settings/translationBody.js of the component Custom Translation Handler. The manipulation results in improper authorization. The attack can be launched remotely. Upgrading to version 8.19 is sufficient to fix this issue. The patch is identified as f244a43771f6ebf40218b83b9f46dba6b940d7de. It is suggested to upgrade the affected component.
Title WeKan Custom Translation translationBody.js setCreateTranslation improper authorization
Weaknesses CWE-266
CWE-285
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Wekan Project Wekan
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:54:44.601Z

Reserved: 2026-02-08T01:14:09.539Z

Link: CVE-2026-2209

cve-icon Vulnrichment

Updated: 2026-02-10T19:43:20.519Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T02:15:57.820

Modified: 2026-02-11T18:56:51.367

Link: CVE-2026-2209

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:15:29Z

Weaknesses