CVE-2026-30855
Received Received - Intake
Authorization Bypass in WeKnora Tenant Management Enables Critical Takeover

Publication date: 2026-03-07

Last updated on: 2026-03-09

Assigner: GitHub, Inc.

Description
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.2, an authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modify, or delete any tenant by ID. Since account registration is open to the public, this vulnerability allows any unauthenticated attacker to register an account and subsequently exploit the system. This enables cross-tenant account takeover and destruction, making the impact critical. This issue has been patched in version 0.3.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-07
Last Modified
2026-03-09
Generated
2026-05-07
AI Q&A
2026-03-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tencent weknora to 0.3.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-30855 is a critical Broken Access Control vulnerability in the WeKnora application, specifically in its tenant management endpoints. It allows any authenticated user to read, modify, or delete any tenant by ID without proper authorization checks.'}, {'type': 'paragraph', 'content': "Because account registration is open to the public, even unauthenticated attackers can register an account and exploit this flaw. The tenant management handlers do not verify tenant ownership or enforce cross-tenant permission checks, enabling attackers to access or manipulate other tenants' data."}, {'type': 'paragraph', 'content': 'This means an attacker can list all tenants, read sensitive tenant data such as API keys, modify configurations of other tenants, or delete tenants entirely, leading to cross-tenant account takeover and destructive actions.'}] [1]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'This vulnerability can have severe impacts including unauthorized access to sensitive data like LLM API keys and knowledge bases belonging to other tenants.'}, {'type': 'paragraph', 'content': "Attackers can modify or delete other tenants' configurations or accounts, resulting in data loss, service disruption, and potential destruction of tenant data."}, {'type': 'paragraph', 'content': "Overall, it enables full compromise of other tenants' accounts and data, posing a critical security risk to the confidentiality, integrity, and availability of the system."}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by testing the tenant management endpoints of the WeKnora application for improper access control. Specifically, you can attempt to use an authenticated account to access, modify, or delete tenants by ID that do not belong to the authenticated user.'}, {'type': 'paragraph', 'content': 'Commands to detect this vulnerability include sending HTTP requests to the following endpoints with an authenticated token or API key:'}, {'type': 'list_item', 'content': 'GET /api/v1/tenants - to list tenants'}, {'type': 'list_item', 'content': 'GET /api/v1/tenants/{id} - to read tenant details by ID'}, {'type': 'list_item', 'content': 'PUT /api/v1/tenants/{id} - to modify tenant details by ID'}, {'type': 'list_item', 'content': 'DELETE /api/v1/tenants/{id} - to delete tenant by ID'}, {'type': 'paragraph', 'content': "For example, using curl to test unauthorized access to another tenant's data:"}, {'type': 'list_item', 'content': 'curl -H "Authorization: Bearer <your_token>" https://your-weknora-instance/api/v1/tenants/10001'}, {'type': 'paragraph', 'content': 'If you can access or modify tenants that you do not own, the vulnerability is present.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate and recommended mitigation is to upgrade the WeKnora application to version 0.3.2 or later, where this authorization bypass vulnerability has been fixed.

Until the upgrade can be performed, consider restricting access to the tenant management endpoints to trusted users only, or disabling public account registration to prevent unauthenticated attackers from registering accounts and exploiting the vulnerability.

Additionally, monitor tenant management API usage for suspicious activity such as unexpected tenant modifications or deletions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart