Impact
The vulnerability lies in Wekan's globalwebhooks publication, which fails to enforce authentication on the server side. As a result, any DDP client, even if unauthenticated, can subscribe to this publication and obtain all global webhook URLs and associated tokens. This permits an attacker to exfiltrate sensitive configuration data and potentially misuse the webhooks to access external services. The defect corresponds to CWE-200 (Information Exposure) and CWE-306 (Missing Authentication).
Affected Systems
Wekan installations running versions 8.31.0 through 8.33 are affected. The issue is present in all builds of those releases regardless of deployment configuration, and is resolved in version 8.34 and newer.
Risk and Exploitability
The CVSS score is 8.7, categorizing the vulnerability as High severity, but the EPSS score is less than 1%, indicating a low probability of exploitation under current conditions. The vulnerability is not listed in CISA’s KEV catalog. Attackers can exploit it by sending a DDP subscription to the globalwebhooks publication from any network location with access to the Wekan server, including unauthenticated clients. This exposes sensitive data and gives the attacker the ability to use or interfere with external services linked through the webhooks.
OpenCVE Enrichment