Impact
The vulnerability in Tencent’s WeKnora framework allows any authenticated user to copy another tenant’s knowledge base by supplying the source knowledge base ID. This function, intended for authorized duplicate creation, has been compromised so that a user can duplicate all documents, FAQs, and other content from a target tenant into their own tenant. As a result, confidential information may be replicated and transferred without permission, fundamentally breaching tenant isolation and confidentiality. The weakness is a classic authorization bypass (CWE-639), where user-provided identifiers are not validated against the user’s privilege scope.
Affected Systems
All installations of WeKnora running a version prior to 0.3.0 are vulnerable. The product, Tencent WeKnora, includes this issue in every patch level below 0.3.0, while the defect has been rectified in the 0.3.0 release and later revisions.
Risk and Exploitability
The CVSS score of 5.3 classifies the flaw as moderate severity, and the EPSS score of less than 1% indicates a very low probability of exploitation at the time of analysis. The flaw is not listed in CISA’s KEV catalog, suggesting no publicly known exploit code. An attacker must be authenticated and must discover or guess a valid source knowledge base ID. Even with authentication, the potential for bulk data exfiltration remains, but the low likelihood of exploitation mitigates overall risk while still necessitating prompt patching.
OpenCVE Enrichment
Github GHSA