WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.2, an authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modify, or delete any tenant by ID. Since account registration is open to the public, this vulnerability allows any unauthenticated attacker to register an account and subsequently exploit the system. This enables cross-tenant account takeover and destruction, making the impact critical. This issue has been patched in version 0.3.2.
References
| Link | Resource |
|---|---|
| https://github.com/Tencent/WeKnora/security/advisories/GHSA-ccj6-79j6-cq5q | Exploit Vendor Advisory |
Configurations
History
09 Mar 2026, 17:33
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Tencent weknora
Tencent |
|
| CPE | cpe:2.3:a:tencent:weknora:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| References | () https://github.com/Tencent/WeKnora/security/advisories/GHSA-ccj6-79j6-cq5q - Exploit, Vendor Advisory |
07 Mar 2026, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-07 17:15
Updated : 2026-03-09 17:33
NVD link : CVE-2026-30855
Mitre link : CVE-2026-30855
CVE.ORG link : CVE-2026-30855
JSON object : View
Products Affected
tencent
- weknora
CWE
CWE-284
Improper Access Control
