Duty Analyst: Moises Salas Lopez

CVE-2026-1896

Published: 2026-02-05 00:15:54 | Last modified: 2026-02-10 17:46:00

MEDIUM CVSS 5.3
No EPSS data

Description

A vulnerability has been found in WeKan up to 8.20. Affected by this vulnerability is the function ComprehensiveBoardMigration of the file server/migrations/comprehensiveBoardMigration.js of the component Migration Operation Handler. The manipulation of the argument boardId leads to improper access controls. The attack is possible to be carried out remotely. Upgrading to version 8.21 addresses this issue. The identifier of the patch is cc35dafef57ef6e44a514a523f9a8d891e74ad8f. Upgrading the affected component is advised.

CVSS details

Severity
medium
Score
5.3
Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

EPSS

This CVE is not currently listed in the EPSS dataset.

Show JSON
{
    "cve": {
        "id": "CVE-2026-1896",
        "cveTags": [],
        "metrics": {
            "cvssMetricV2": [
                {
                    "type": "Secondary",
                    "source": "cna@vuldb.com",
                    "cvssData": {
                        "version": "2.0",
                        "baseScore": 6.5,
                        "accessVector": "NETWORK",
                        "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                        "authentication": "SINGLE",
                        "integrityImpact": "PARTIAL",
                        "accessComplexity": "LOW",
                        "availabilityImpact": "PARTIAL",
                        "confidentialityImpact": "PARTIAL"
                    },
                    "acInsufInfo": false,
                    "impactScore": 6.4,
                    "baseSeverity": "MEDIUM",
                    "obtainAllPrivilege": false,
                    "exploitabilityScore": 8,
                    "obtainUserPrivilege": false,
                    "obtainOtherPrivilege": false,
                    "userInteractionRequired": false
                }
            ],
            "cvssMetricV31": [
                {
                    "type": "Primary",
                    "source": "cna@vuldb.com",
                    "cvssData": {
                        "scope": "UNCHANGED",
                        "version": "3.1",
                        "baseScore": 6.3,
                        "attackVector": "NETWORK",
                        "baseSeverity": "MEDIUM",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
                        "integrityImpact": "LOW",
                        "userInteraction": "NONE",
                        "attackComplexity": "LOW",
                        "availabilityImpact": "LOW",
                        "privilegesRequired": "LOW",
                        "confidentialityImpact": "LOW"
                    },
                    "impactScore": 3.4,
                    "exploitabilityScore": 2.8
                }
            ],
            "cvssMetricV40": [
                {
                    "type": "Secondary",
                    "source": "cna@vuldb.com",
                    "cvssData": {
                        "Safety": "NOT_DEFINED",
                        "version": "4.0",
                        "Recovery": "NOT_DEFINED",
                        "baseScore": 5.3,
                        "Automatable": "NOT_DEFINED",
                        "attackVector": "NETWORK",
                        "baseSeverity": "MEDIUM",
                        "valueDensity": "NOT_DEFINED",
                        "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
                        "exploitMaturity": "NOT_DEFINED",
                        "providerUrgency": "NOT_DEFINED",
                        "userInteraction": "NONE",
                        "attackComplexity": "LOW",
                        "attackRequirements": "NONE",
                        "privilegesRequired": "LOW",
                        "subIntegrityImpact": "NONE",
                        "vulnIntegrityImpact": "LOW",
                        "integrityRequirement": "NOT_DEFINED",
                        "modifiedAttackVector": "NOT_DEFINED",
                        "subAvailabilityImpact": "NONE",
                        "vulnAvailabilityImpact": "LOW",
                        "availabilityRequirement": "NOT_DEFINED",
                        "modifiedUserInteraction": "NOT_DEFINED",
                        "modifiedAttackComplexity": "NOT_DEFINED",
                        "subConfidentialityImpact": "NONE",
                        "vulnConfidentialityImpact": "LOW",
                        "confidentialityRequirement": "NOT_DEFINED",
                        "modifiedAttackRequirements": "NOT_DEFINED",
                        "modifiedPrivilegesRequired": "NOT_DEFINED",
                        "modifiedSubIntegrityImpact": "NOT_DEFINED",
                        "modifiedVulnIntegrityImpact": "NOT_DEFINED",
                        "vulnerabilityResponseEffort": "NOT_DEFINED",
                        "modifiedSubAvailabilityImpact": "NOT_DEFINED",
                        "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
                        "modifiedSubConfidentialityImpact": "NOT_DEFINED",
                        "modifiedVulnConfidentialityImpact": "NOT_DEFINED"
                    }
                }
            ]
        },
        "published": "2026-02-05T00:15:53.760",
        "references": [
            {
                "url": "https://github.com/wekan/wekan/",
                "tags": [
                    "Product"
                ],
                "source": "cna@vuldb.com"
            },
            {
                "url": "https://github.com/wekan/wekan/commit/cc35dafef57ef6e44a514a523f9a8d891e74ad8f",
                "tags": [
                    "Patch"
                ],
                "source": "cna@vuldb.com"
            },
            {
                "url": "https://github.com/wekan/wekan/releases/tag/v8.21",
                "tags": [
                    "Release Notes"
                ],
                "source": "cna@vuldb.com"
            },
            {
                "url": "https://vuldb.com/?ctiid.344268",
                "tags": [
                    "Permissions Required",
                    "VDB Entry"
                ],
                "source": "cna@vuldb.com"
            },
            {
                "url": "https://vuldb.com/?id.344268",
                "tags": [
                    "Third Party Advisory",
                    "VDB Entry"
                ],
                "source": "cna@vuldb.com"
            },
            {
                "url": "https://vuldb.com/?submit.742670",
                "tags": [
                    "Third Party Advisory",
                    "VDB Entry"
                ],
                "source": "cna@vuldb.com"
            }
        ],
        "vulnStatus": "Analyzed",
        "weaknesses": [
            {
                "type": "Primary",
                "source": "cna@vuldb.com",
                "description": [
                    {
                        "lang": "en",
                        "value": "CWE-266"
                    },
                    {
                        "lang": "en",
                        "value": "CWE-284"
                    }
                ]
            }
        ],
        "descriptions": [
            {
                "lang": "en",
                "value": "A vulnerability has been found in WeKan up to 8.20. Affected by this vulnerability is the function ComprehensiveBoardMigration of the file server/migrations/comprehensiveBoardMigration.js of the component Migration Operation Handler. The manipulation of the argument boardId leads to improper access controls. The attack is possible to be carried out remotely. Upgrading to version 8.21 addresses this issue. The identifier of the patch is cc35dafef57ef6e44a514a523f9a8d891e74ad8f. Upgrading the affected component is advised."
            }
        ],
        "lastModified": "2026-02-10T17:45:59.510",
        "configurations": [
            {
                "nodes": [
                    {
                        "negate": false,
                        "cpeMatch": [
                            {
                                "criteria": "cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:*",
                                "vulnerable": true,
                                "matchCriteriaId": "083807DE-F47B-4A75-916B-CDC9A3307747",
                                "versionEndExcluding": "8.21"
                            }
                        ],
                        "operator": "OR"
                    }
                ]
            }
        ],
        "sourceIdentifier": "cna@vuldb.com"
    }
}