Impact
A flaw in Tencent WeKnora’s Config API endpoint allows an attacker to alter the kbId argument of getKnowledgeBaseForInitialization, bypassing authorization checks and gaining unauthorized access to knowledge base data. This results in a loss of confidentiality and potential for privileged data exposure. The weakness corresponds to CWE‑285 (Improper Authorization) and CWE‑639 (Privilege Escalation through Role-based Access).
Affected Systems
Tencent WeKnora up to version 0.3.6 is affected. The vulnerable component is the internal/handler/initialization.go file within the Config API Endpoint.
Risk and Exploitability
The vulnerability carries a CVSS base score of 5.3, indicating medium severity. EPSS information is unavailable, and the issue is not listed in CISA’s KEV catalog. Attackers can exploit the flaw remotely by sending crafted HTTP requests to the exposed endpoint, with no proof-of-concept required. Given the lack of a vendor response, the risk remains medium until a fix is released and deployed.
OpenCVE Enrichment