Impact
Wekan versions 8.32 and 8.33 lack validation when loading attachment URLs during board import. The server blindly fetches URLs provided in user-supplied JSON, permitting any authenticated user to force the server to request any HTTP endpoint. This can reveal internal services, cloud instance metadata, or exposed administrative panels, effectively exposing sensitive data or enabling further attacks.
Affected Systems
The vulnerability affects the Wekan open source kanban tool, specifically releases 8.32 and 8.33. Both the native Wekan import flow and the Trello import flow use the same parsing logic and are therefore exposed.
Risk and Exploitability
The flaw carries a CVSS score of 9.3, indicating critical impact and high exploitation potential. The EPSS score is reported as less than 1%, suggesting a low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. An attacker must be authenticated to perform the import, but once granted access, the attacker can trick the server into connecting to arbitrary internal resources, potentially leaking credentials, database contents, or other sensitive information.
OpenCVE Enrichment