Description
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.0, a cross-tenant authorization bypass in the knowledge base copy endpoint allows any authenticated user to clone (duplicate) another tenant’s knowledge base into their own tenant by knowing/guessing the source knowledge base ID. This enables bulk data exfiltration (document/FAQ content) across tenants. This issue has been patched in version 0.3.0.
Published: 2026-03-07
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Data Exfiltration
Action: Apply Patch
AI Analysis

Impact

The vulnerability in Tencent’s WeKnora framework allows any authenticated user to copy another tenant’s knowledge base by supplying the source knowledge base ID. This function, intended for authorized duplicate creation, has been compromised so that a user can duplicate all documents, FAQs, and other content from a target tenant into their own tenant. As a result, confidential information may be replicated and transferred without permission, fundamentally breaching tenant isolation and confidentiality. The weakness is a classic authorization bypass (CWE-639), where user-provided identifiers are not validated against the user’s privilege scope.

Affected Systems

All installations of WeKnora running a version prior to 0.3.0 are vulnerable. The product, Tencent WeKnora, includes this issue in every patch level below 0.3.0, while the defect has been rectified in the 0.3.0 release and later revisions.

Risk and Exploitability

The CVSS score of 5.3 classifies the flaw as moderate severity, and the EPSS score of less than 1% indicates a very low probability of exploitation at the time of analysis. The flaw is not listed in CISA’s KEV catalog, suggesting no publicly known exploit code. An attacker must be authenticated and must discover or guess a valid source knowledge base ID. Even with authentication, the potential for bulk data exfiltration remains, but the low likelihood of exploitation mitigates overall risk while still necessitating prompt patching.

Generated by OpenCVE AI on April 17, 2026 at 12:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WeKnora to version 0.3.0 or later where the authorization bypass has been fixed.
  • If immediate upgrade is not possible, restrict the clone endpoint so that only users with a designated administrator role can execute cloning operations, thereby enforcing strict role-based access control.
  • Implement additional validation to ensure that knowledge base IDs supplied to the clone endpoint cannot be guessed or enumerated by ordinary users, such as requiring session‑specific tokens or random identifiers.

Generated by OpenCVE AI on April 17, 2026 at 12:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8rf9-c59g-f82f WeKnora has Unauthorized Cross‑Tenant Knowledge Base Cloning
History

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tencent:weknora:*:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tencent
Tencent weknora
Vendors & Products Tencent
Tencent weknora

Sat, 07 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.0, a cross-tenant authorization bypass in the knowledge base copy endpoint allows any authenticated user to clone (duplicate) another tenant’s knowledge base into their own tenant by knowing/guessing the source knowledge base ID. This enables bulk data exfiltration (document/FAQ content) across tenants. This issue has been patched in version 0.3.0.
Title WeKnora: Unauthorized Cross‑Tenant Knowledge Base Cloning
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T18:24:26.835Z

Reserved: 2026-03-05T21:27:35.342Z

Link: CVE-2026-30857

cve-icon Vulnrichment

Updated: 2026-03-09T17:52:21.649Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T17:15:53.370

Modified: 2026-03-09T17:34:19.010

Link: CVE-2026-30857

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:15:18Z

Weaknesses