CVE-2026-25562
Information Disclosure in WeKan Attachments Due to Improper Access Control
Publication date: 2026-02-07
Last updated on: 2026-02-10
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wekan_project | wekan | to 8.19 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-203 | The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Wekan versions prior to 8.19 and involves information disclosure related to attachments. Specifically, attachment metadata can be returned without properly restricting the results to only those boards and cards that the requesting user has access to. This means that unauthorized users might be able to see metadata about attachments they should not have permission to view.
How can this vulnerability impact me? :
The impact of this vulnerability is the potential exposure of sensitive attachment metadata to unauthorized users. This could lead to leakage of confidential information, privacy violations, or other security risks depending on the nature of the attachments and their metadata.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know