WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in checklist creation and related checklist routes. The implementation does not verify that the supplied cardId belongs to the supplied boardId, allowing cross-board ID tampering by manipulating identifiers.
References
| Link | Resource |
|---|---|
| https://github.com/wekan/wekan/commit/5cd875813fdec5a3c40a0358b30a347967c85c14 | Patch |
| https://wekan.fi/ | Product |
| https://www.vulncheck.com/advisories/wekan-checklist-creation-cross-board-idor | Third Party Advisory |
Configurations
History
10 Feb 2026, 21:59
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:* | |
| First Time |
Wekan Project wekan
Wekan Project |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | () https://github.com/wekan/wekan/commit/5cd875813fdec5a3c40a0358b30a347967c85c14 - Patch | |
| References | () https://wekan.fi/ - Product | |
| References | () https://www.vulncheck.com/advisories/wekan-checklist-creation-cross-board-idor - Third Party Advisory |
07 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-07 22:16
Updated : 2026-02-10 21:59
NVD link : CVE-2026-25563
Mitre link : CVE-2026-25563
CVE.ORG link : CVE-2026-25563
JSON object : View
Products Affected
wekan_project
- wekan
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
