CVE-2026-22788
Unauthenticated API Access in WebErpMesV2 Exposes Sensitive Data
Publication date: 2026-01-12
Last updated on: 2026-01-12
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| smewebify | weberpmesv2 | to 1.19 (exc) |
| smewebify | weberpmesv2 | 1.19 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability exposes sensitive business-critical data without authentication, allowing unauthenticated attackers to read and partially modify data. Such unauthorized data access and manipulation can lead to violations of data protection regulations like GDPR and HIPAA, which require strict controls on access to personal and sensitive information. The lack of authentication and potential data exfiltration or tampering undermines confidentiality and integrity requirements mandated by these standards, thereby negatively impacting compliance. [1]
Can you explain this vulnerability to me?
CVE-2026-22788 is a high-severity vulnerability in the WebErpMesV2 application versions prior to 1.19, caused by missing authentication middleware on multiple sensitive API endpoints. This means that unauthenticated remote attackers can access at least 19 API endpoints without any authentication, allowing them to read sensitive business data such as companies, quotes, orders, tasks, energy consumption, sales order exports, and collaboration whiteboards. Additionally, attackers have limited write access, enabling them to create new company records and fully manipulate collaboration whiteboards, including creating and modifying whiteboards and their snapshots. The root cause is that the API middleware group lacks authentication middleware, only applying rate limiting and route binding, leaving critical endpoints exposed. [1]
How can this vulnerability impact me? :
This vulnerability can have significant impacts including high confidentiality loss as attackers can completely disclose business-critical data. Integrity is also affected since attackers can create fraudulent company records and manipulate collaboration whiteboards. Availability impact is low as no delete operations are exposed. Potential attack scenarios include data exfiltration, data pollution, and hijacking of collaboration tools. Since the software is typically self-hosted on internal networks, the risk depends on network exposure, but the vulnerability allows unauthenticated remote attackers to exploit these issues easily. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by attempting unauthenticated HTTP requests to the exposed API endpoints. For example, use curl commands to send GET requests to endpoints such as /api/companies, /api/quote, /api/order, /api/tasks, and /api/collaboration/whiteboards. If these endpoints return data without authentication, the system is vulnerable. Example commands: curl -X GET http://<target>/api/companies curl -X GET http://<target>/api/quote curl -X GET http://<target>/api/collaboration/whiteboards Additionally, you can try POST requests to create records, e.g., curl -X POST http://<target>/api/companies -d '{"name":"test"}' -H 'Content-Type: application/json' to check if write access is exposed without authentication. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves adding authentication middleware to the API routes. Specifically, add 'auth:sanctum' middleware to the 'api' middleware group in the app/Http/Kernel.php file to enforce authentication on all API endpoints. Alternatively, wrap all API routes in routes/api.php within an authentication middleware group using Laravel Sanctum. This ensures that only authenticated users can access the API endpoints. Additional recommendations include implementing role-based access control, audit logging, and API versioning. Upgrading to WebErpMesv2 version 1.19 or later, where this fix is applied, is also advised. [1, 2]