CVE-2026-2209
Improper Authorization in WeKan setCreateTranslation Allows Remote Access
Publication date: 2026-02-08
Last updated on: 2026-02-11
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wekan_project | wekan | to 8.19 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-2209 is an improper authorization vulnerability in Wekan versions up to 8.18, specifically in the function setCreateTranslation within the Custom Translation Handler component. This flaw is an Insecure Direct Object Reference (IDOR) that allows non-admin users to create, modify, or delete custom translations without proper permissions.
The vulnerability arises because the system lacks adequate authorization checks, enabling unauthorized remote attackers to manipulate translation data that should be restricted to administrators only.
The issue was fixed in version 8.19 by adding server-side authorization checks that ensure only admin users can perform translation operations.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthorized users to manipulate custom translations in your Wekan instance, potentially leading to unauthorized changes in displayed content.
Such unauthorized modifications can affect the integrity and availability of translation data, possibly causing confusion or misinformation for users relying on accurate translations.
Because the attack can be launched remotely with low complexity and no user interaction, it poses a moderate security risk.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There is no specific detection method or network/system commands provided in the available resources to identify this vulnerability directly.
What immediate steps should I take to mitigate this vulnerability?
The immediate and recommended mitigation step is to upgrade Wekan to version 8.19 or later, which contains the patch fixing this vulnerability.
The patch includes adding strict server-side authorization checks to ensure only admin users can create, update, or delete custom translations, preventing unauthorized access.
Specifically, the fix routes deletion requests through a dedicated server method with admin verification and protects all translation modification methods with admin checks.