A vulnerability was found in WeKan up to 8.20. This affects an unknown function of the file models/attachments.js of the component Attachment Storage. The manipulation results in improper access controls. The attack may be launched remotely. Upgrading to version 8.21 mitigates this issue. The patch is identified as c413a7e860bc4d93fe2adcf82516228570bf382d. Upgrading the affected component is advised.
WeKan Attachment Storage attachments.js MoveStorageBleed access control
Problem type
Affected products
8.0 - AFFECTED
8.1 - AFFECTED
8.2 - AFFECTED
8.3 - AFFECTED
8.4 - AFFECTED
8.5 - AFFECTED
8.6 - AFFECTED
8.7 - AFFECTED
8.8 - AFFECTED
8.9 - AFFECTED
8.10 - AFFECTED
8.11 - AFFECTED
8.12 - AFFECTED
8.13 - AFFECTED
8.14 - AFFECTED
8.15 - AFFECTED
8.16 - AFFECTED
8.17 - AFFECTED
8.18 - AFFECTED
8.19 - AFFECTED
8.20 - AFFECTED
8.21 - UNAFFECTED
References
https://vuldb.com/?id.344485
https://vuldb.com/?ctiid.344485
https://vuldb.com/?submit.742678
https://github.com/wekan/wekan/commit/c413a7e860bc4d93fe2adcf82516228570bf382d
https://github.com/wekan/wekan/releases/tag/v8.21
https://github.com/wekan/wekan/
GitHub Security Advisories
GHSA-38wp-738r-69jh
A vulnerability was found in WeKan up to 8.20. This affects an unknown function of the file...
https://github.com/advisories/GHSA-38wp-738r-69jhA vulnerability was found in WeKan up to 8.20. This affects an unknown function of the file models/attachments.js of the component Attachment Storage. The manipulation results in improper access controls. The attack may be launched remotely. Upgrading to version 8.21 mitigates this issue. The patch is identified as c413a7e860bc4d93fe2adcf82516228570bf382d. Upgrading the affected component is advised.
https://nvd.nist.gov/vuln/detail/CVE-2026-1963
https://github.com/wekan/wekan/commit/c413a7e860bc4d93fe2adcf82516228570bf382d
https://github.com/wekan/wekan
https://github.com/wekan/wekan/releases/tag/v8.21
https://vuldb.com/?ctiid.344485
https://vuldb.com/?id.344485
https://vuldb.com/?submit.742678
https://github.com/advisories/GHSA-38wp-738r-69jh
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-1963Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-1963",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2026-02-05T21:02:07.761Z",
"dateReserved": "2026-02-05T10:51:34.836Z",
"datePublished": "2026-02-05T21:02:07.761Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2026-02-05T21:02:07.761Z"
},
"title": "WeKan Attachment Storage attachments.js MoveStorageBleed access control",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in WeKan up to 8.20. This affects an unknown function of the file models/attachments.js of the component Attachment Storage. The manipulation results in improper access controls. The attack may be launched remotely. Upgrading to version 8.21 mitigates this issue. The patch is identified as c413a7e860bc4d93fe2adcf82516228570bf382d. Upgrading the affected component is advised."
}
],
"affected": [
{
"vendor": "n/a",
"product": "WeKan",
"modules": [
"Attachment Storage"
],
"versions": [
{
"version": "8.0",
"status": "affected"
},
{
"version": "8.1",
"status": "affected"
},
{
"version": "8.2",
"status": "affected"
},
{
"version": "8.3",
"status": "affected"
},
{
"version": "8.4",
"status": "affected"
},
{
"version": "8.5",
"status": "affected"
},
{
"version": "8.6",
"status": "affected"
},
{
"version": "8.7",
"status": "affected"
},
{
"version": "8.8",
"status": "affected"
},
{
"version": "8.9",
"status": "affected"
},
{
"version": "8.10",
"status": "affected"
},
{
"version": "8.11",
"status": "affected"
},
{
"version": "8.12",
"status": "affected"
},
{
"version": "8.13",
"status": "affected"
},
{
"version": "8.14",
"status": "affected"
},
{
"version": "8.15",
"status": "affected"
},
{
"version": "8.16",
"status": "affected"
},
{
"version": "8.17",
"status": "affected"
},
{
"version": "8.18",
"status": "affected"
},
{
"version": "8.19",
"status": "affected"
},
{
"version": "8.20",
"status": "affected"
},
{
"version": "8.21",
"status": "unaffected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Improper Access Controls",
"cweId": "CWE-284",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Incorrect Privilege Assignment",
"cweId": "CWE-266",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?id.344485",
"name": "VDB-344485 | WeKan Attachment Storage attachments.js MoveStorageBleed access control",
"tags": [
"vdb-entry"
]
},
{
"url": "https://vuldb.com/?ctiid.344485",
"name": "VDB-344485 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.742678",
"name": "Submit #742678 | Wekan <8.21 Improper access control (CWE-284)",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/wekan/wekan/commit/c413a7e860bc4d93fe2adcf82516228570bf382d",
"tags": [
"patch"
]
},
{
"url": "https://github.com/wekan/wekan/releases/tag/v8.21",
"tags": [
"patch"
]
},
{
"url": "https://github.com/wekan/wekan/",
"tags": [
"product"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:OF/RC:C",
"baseScore": 6.5
}
}
],
"timeline": [
{
"time": "2026-02-05T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2026-02-05T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2026-02-05T11:57:04.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "MegaManSec (VulDB User)",
"type": "reporter"
}
],
"tags": [
"x_open-source"
]
}
}
}