CVE-2026-25567

WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card comment creation API. The endpoint accepts an authorId from the request body, allowing an authenticated user to spoof the recorded comment author by supplying another user's identifier.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:*

History

10 Feb 2026, 21:56

Type Values Removed Values Added
CPE cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
First Time Wekan Project wekan
Wekan Project
References () https://github.com/wekan/wekan/commit/67cb47173c1a152d9eaf5469740992b2dacdf62d - () https://github.com/wekan/wekan/commit/67cb47173c1a152d9eaf5469740992b2dacdf62d - Patch
References () https://wekan.fi/ - () https://wekan.fi/ - Product
References () https://www.vulncheck.com/advisories/wekan-card-comment-author-spoofing-via-user-controlled-authorid - () https://www.vulncheck.com/advisories/wekan-card-comment-author-spoofing-via-user-controlled-authorid - Third Party Advisory

07 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-07 22:16

Updated : 2026-02-10 21:56


NVD link : CVE-2026-25567

Mitre link : CVE-2026-25567

CVE.ORG link : CVE-2026-25567


JSON object : View

Products Affected

wekan_project

  • wekan
CWE
CWE-639

Authorization Bypass Through User-Controlled Key