WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card comment creation API. The endpoint accepts an authorId from the request body, allowing an authenticated user to spoof the recorded comment author by supplying another user's identifier.
References
| Link | Resource |
|---|---|
| https://github.com/wekan/wekan/commit/67cb47173c1a152d9eaf5469740992b2dacdf62d | Patch |
| https://wekan.fi/ | Product |
| https://www.vulncheck.com/advisories/wekan-card-comment-author-spoofing-via-user-controlled-authorid | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-02-07 22:16
Updated : 2026-02-10 21:56
NVD link : CVE-2026-25567
Mitre link : CVE-2026-25567
CVE.ORG link : CVE-2026-25567
JSON object : View
Products Affected
wekan_project
- wekan
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
