WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card comment creation API. The endpoint accepts an authorId from the request body, allowing an authenticated user to spoof the recorded comment author by supplying another user's identifier.
References
| Link | Resource |
|---|---|
| https://github.com/wekan/wekan/commit/67cb47173c1a152d9eaf5469740992b2dacdf62d | Patch |
| https://wekan.fi/ | Product |
| https://www.vulncheck.com/advisories/wekan-card-comment-author-spoofing-via-user-controlled-authorid | Third Party Advisory |
Configurations
History
10 Feb 2026, 21:56
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
| First Time |
Wekan Project wekan
Wekan Project |
|
| References | () https://github.com/wekan/wekan/commit/67cb47173c1a152d9eaf5469740992b2dacdf62d - Patch | |
| References | () https://wekan.fi/ - Product | |
| References | () https://www.vulncheck.com/advisories/wekan-card-comment-author-spoofing-via-user-controlled-authorid - Third Party Advisory |
07 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-07 22:16
Updated : 2026-02-10 21:56
NVD link : CVE-2026-25567
Mitre link : CVE-2026-25567
CVE.ORG link : CVE-2026-25567
JSON object : View
Products Affected
wekan_project
- wekan
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
