CVE-2026-22788
Unknown Unknown - Not Provided
Unauthenticated API Access in WebErpMesV2 Exposes Sensitive Data

Publication date: 2026-01-12

Last updated on: 2026-01-12

Assigner: GitHub, Inc.

Description
WebErpMesv2 is a Resource Management and Manufacturing execution system Web for industry. Prior to 1.19, the WebErpMesV2 application exposes multiple sensitive API endpoints without authentication middleware. An unauthenticated remote attacker can read business-critical data including companies, quotes, orders, tasks, and whiteboards. Limited write access allows creation of company records and full manipulation of collaboration whiteboards. This vulnerability is fixed in 1.19.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-12
Last Modified
2026-01-12
Generated
2026-05-07
AI Q&A
2026-01-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
smewebify weberpmesv2 to 1.19 (exc)
smewebify weberpmesv2 1.19
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability exposes sensitive business-critical data without authentication, allowing unauthenticated attackers to read and partially modify data. Such unauthorized data access and manipulation can lead to violations of data protection regulations like GDPR and HIPAA, which require strict controls on access to personal and sensitive information. The lack of authentication and potential data exfiltration or tampering undermines confidentiality and integrity requirements mandated by these standards, thereby negatively impacting compliance. [1]


Can you explain this vulnerability to me?

CVE-2026-22788 is a high-severity vulnerability in the WebErpMesV2 application versions prior to 1.19, caused by missing authentication middleware on multiple sensitive API endpoints. This means that unauthenticated remote attackers can access at least 19 API endpoints without any authentication, allowing them to read sensitive business data such as companies, quotes, orders, tasks, energy consumption, sales order exports, and collaboration whiteboards. Additionally, attackers have limited write access, enabling them to create new company records and fully manipulate collaboration whiteboards, including creating and modifying whiteboards and their snapshots. The root cause is that the API middleware group lacks authentication middleware, only applying rate limiting and route binding, leaving critical endpoints exposed. [1]


How can this vulnerability impact me? :

This vulnerability can have significant impacts including high confidentiality loss as attackers can completely disclose business-critical data. Integrity is also affected since attackers can create fraudulent company records and manipulate collaboration whiteboards. Availability impact is low as no delete operations are exposed. Potential attack scenarios include data exfiltration, data pollution, and hijacking of collaboration tools. Since the software is typically self-hosted on internal networks, the risk depends on network exposure, but the vulnerability allows unauthenticated remote attackers to exploit these issues easily. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by attempting unauthenticated HTTP requests to the exposed API endpoints. For example, use curl commands to send GET requests to endpoints such as /api/companies, /api/quote, /api/order, /api/tasks, and /api/collaboration/whiteboards. If these endpoints return data without authentication, the system is vulnerable. Example commands: curl -X GET http://<target>/api/companies curl -X GET http://<target>/api/quote curl -X GET http://<target>/api/collaboration/whiteboards Additionally, you can try POST requests to create records, e.g., curl -X POST http://<target>/api/companies -d '{"name":"test"}' -H 'Content-Type: application/json' to check if write access is exposed without authentication. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves adding authentication middleware to the API routes. Specifically, add 'auth:sanctum' middleware to the 'api' middleware group in the app/Http/Kernel.php file to enforce authentication on all API endpoints. Alternatively, wrap all API routes in routes/api.php within an authentication middleware group using Laravel Sanctum. This ensures that only authenticated users can access the API endpoints. Additional recommendations include implementing role-based access control, audit logging, and API versioning. Upgrading to WebErpMesv2 version 1.19 or later, where this fix is applied, is also advised. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart