Description
WebErpMesv2 is a Resource Management and Manufacturing execution system Web for industry. Prior to 1.19, the WebErpMesV2 application exposes multiple sensitive API endpoints without authentication middleware. An unauthenticated remote attacker can read business-critical data including companies, quotes, orders, tasks, and whiteboards. Limited write access allows creation of company records and full manipulation of collaboration whiteboards. This vulnerability is fixed in 1.19.
Published: 2026-01-12
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated remote access to sensitive API endpoints exposing business‑critical data and limited write capabilities
Action: Patch Now
AI Analysis

Impact

The WebErpMesv2 system exposes a number of API endpoints without any authentication middleware, allowing an unauthenticated remote attacker to retrieve sensitive business data such as company profiles, quotes, orders, tasks, and collaboration whiteboards. In addition, the system permits limited write operations that enable the creation of new company records and full manipulation of collaboration whiteboards. This lack of authentication constitutes a significant confidentiality and integrity breach, giving a malicious actor broad visibility and control over critical operational data.

Affected Systems

The vulnerability affects the SMEWebify WebErpMesv2 application in all releases prior to version 1.19. No specific patch level is provided beyond the recommendation to upgrade to 1.19 or later. The vendor product is identified as WebErpMesv2 and the affected vendor is SMEWebify.

Risk and Exploitability

The CVSS score of 8.2 indicates high severity. An EPSS score of less than 1% suggests that the likelihood of active exploitation in the field is currently low, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be remote over the network, as the exposed API endpoints are reachable without authentication. An attacker can trigger the exploit by sending HTTP requests to any of the vulnerable endpoints, resulting in data disclosure or state modification. Although no publicly documented exploits exist, the high impact warrants immediate attention.

Generated by OpenCVE AI on April 18, 2026 at 06:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WebErpMesv2 to version 1.19 or later, which implements authentication middleware for all API endpoints.
  • If an upgrade cannot yet be performed, restrict access to the API endpoints by firewall rules or enforce VPN usage to limit exposure to trusted hosts.
  • Ensure that after upgrades or network restriction, all API endpoints require proper authentication and authorization; disable or remove any unused APIs to reduce attack surface.

Generated by OpenCVE AI on April 18, 2026 at 06:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 21 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Wem-project
Wem-project wem
CPEs cpe:2.3:a:wem-project:wem:*:*:*:*:*:*:*:*
Vendors & Products Wem-project
Wem-project wem

Tue, 13 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 12 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
Description WebErpMesv2 is a Resource Management and Manufacturing execution system Web for industry. Prior to 1.19, the WebErpMesV2 application exposes multiple sensitive API endpoints without authentication middleware. An unauthenticated remote attacker can read business-critical data including companies, quotes, orders, tasks, and whiteboards. Limited write access allows creation of company records and full manipulation of collaboration whiteboards. This vulnerability is fixed in 1.19.
Title WebErpMesv2 allows unauthenticated API Access
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-13T19:08:34.529Z

Reserved: 2026-01-09T18:27:19.388Z

Link: CVE-2026-22788

cve-icon Vulnrichment

Updated: 2026-01-13T14:14:47.801Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-12T22:16:08.343

Modified: 2026-01-21T19:11:14.150

Link: CVE-2026-22788

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:00:11Z

Weaknesses