CVE-2026-2209
Unknown Unknown - Not Provided
Improper Authorization in WeKan setCreateTranslation Allows Remote Access

Publication date: 2026-02-08

Last updated on: 2026-02-11

Assigner: VulDB

Description
A vulnerability was detected in WeKan up to 8.18. The affected element is the function setCreateTranslation of the file client/components/settings/translationBody.js of the component Custom Translation Handler. The manipulation results in improper authorization. The attack can be launched remotely. Upgrading to version 8.19 is sufficient to fix this issue. The patch is identified as f244a43771f6ebf40218b83b9f46dba6b940d7de. It is suggested to upgrade the affected component.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-08
Last Modified
2026-02-11
Generated
2026-05-07
AI Q&A
2026-02-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wekan_project wekan to 8.19 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-2209 is an improper authorization vulnerability in Wekan versions up to 8.18, specifically in the function setCreateTranslation within the Custom Translation Handler component. This flaw is an Insecure Direct Object Reference (IDOR) that allows non-admin users to create, modify, or delete custom translations without proper permissions.

The vulnerability arises because the system lacks adequate authorization checks, enabling unauthorized remote attackers to manipulate translation data that should be restricted to administrators only.

The issue was fixed in version 8.19 by adding server-side authorization checks that ensure only admin users can perform translation operations.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized users to manipulate custom translations in your Wekan instance, potentially leading to unauthorized changes in displayed content.

Such unauthorized modifications can affect the integrity and availability of translation data, possibly causing confusion or misinformation for users relying on accurate translations.

Because the attack can be launched remotely with low complexity and no user interaction, it poses a moderate security risk.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

There is no specific detection method or network/system commands provided in the available resources to identify this vulnerability directly.


What immediate steps should I take to mitigate this vulnerability?

The immediate and recommended mitigation step is to upgrade Wekan to version 8.19 or later, which contains the patch fixing this vulnerability.

The patch includes adding strict server-side authorization checks to ensure only admin users can create, update, or delete custom translations, preventing unauthorized access.

Specifically, the fix routes deletion requests through a dedicated server method with admin verification and protects all translation modification methods with admin checks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart