Description
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.2, an authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modify, or delete any tenant by ID. Since account registration is open to the public, this vulnerability allows any unauthenticated attacker to register an account and subsequently exploit the system. This enables cross-tenant account takeover and destruction, making the impact critical. This issue has been patched in version 0.3.2.
Published: 2026-03-07
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Authorization bypass permitting unauthenticated or authenticated users to read, modify, or delete any tenant
Action: Immediate Patch
AI Analysis

Impact

A broken access control flaw in the tenant management endpoints of WeKnora allows any authenticated user to perform actions on any tenant by ID, effectively enabling cross‑tenant account takeover. Because account registration is open to the public, an attacker can create a new user account and then exploit the same flaw. The vulnerability permits full read, modify, and delete rights, compromising confidentiality, integrity, and availability of tenant data. The weakness is a classic authorization bypass, identified as CWE‑284.

Affected Systems

Tencent WeKnora, any deployment running a version before 0.3.2 is vulnerable. All tenants hosted on those instances are affected until the software is updated to 0.3.2 or later.

Risk and Exploitability

The CVSS score of 8.8 classifies the risk as high, but the EPSS of less than 1 percent indicates a low probability of real‑world exploitation at the time of analysis. The flaw is not listed in CISA’s KEV catalog. Exploitation is straightforward: an attacker registers an account, requests the tenant ID to target, and then uses the unauthorized endpoint to read, alter, or delete tenant data. No special conditions beyond authentication are required, making the attack vector simple and the impact critical.

Generated by OpenCVE AI on April 16, 2026 at 10:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the 0.3.2 patch or later to eliminate the broken access control logic
  • Disable public account registration or limit tenant‑management access to privileged users only
  • Monitor system logs for unauthorized tenant‑management actions and investigate any anomalies

Generated by OpenCVE AI on April 16, 2026 at 10:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-ccj6-79j6-cq5q WeKnora Vulnerable to Broken Access Control in Tenant Management
History

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tencent:weknora:*:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tencent
Tencent weknora
Vendors & Products Tencent
Tencent weknora

Sat, 07 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.2, an authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modify, or delete any tenant by ID. Since account registration is open to the public, this vulnerability allows any unauthenticated attacker to register an account and subsequently exploit the system. This enables cross-tenant account takeover and destruction, making the impact critical. This issue has been patched in version 0.3.2.
Title WeKnora: Broken Access Control in Tenant Management
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T18:24:39.227Z

Reserved: 2026-03-05T21:27:35.342Z

Link: CVE-2026-30855

cve-icon Vulnrichment

Updated: 2026-03-09T17:58:56.726Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T17:15:53.053

Modified: 2026-03-09T17:33:08.627

Link: CVE-2026-30855

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:00:10Z

Weaknesses