HomeWekan ProjectCVE-2026-1894

CVE-2026-1894

MEDIUM
5.3CVSS
Published: 2026-02-04
Updated: 2026-02-11
AI Analysis

Description

A vulnerability was detected in WeKan up to 8.20. This impacts an unknown function of the file models/checklistItems.js of the component REST API. Performing a manipulation of the argument item.cardId/item.checklistId/card.boardId results in improper authorization. Remote exploitation of the attack is possible. Upgrading to version 8.21 will fix this issue. The patch is named 251d49eea94834cf351bb395808f4a56fb4dbb44. Upgrading the affected component is recommended.

CVSS Metrics

Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Confidentiality
undefined
Integrity
undefined
Availability
undefined
Weaknesses
CWE-266CWE-285

Metadata

Primary Vendor
WEKAN_PROJECT
Published
2/4/2026
Last Modified
2/11/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

wekan_project : wekan

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-1894 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com