2026-02-07 21:56CVE-2026-25560VulnCheck
PUBLISHED5.2CWE-90

WeKan < 8.19 LDAP Authentication Filter Injection

WeKan versions prior to 8.19 contain an LDAP filter injection vulnerability in LDAP authentication. User-supplied username input is incorporated into LDAP search filters and DN-related values without adequate escaping, allowing an attacker to manipulate LDAP queries during authentication.

Problem type

Affected products

WeKan

WeKan

< 8.19 - AFFECTED

References

GitHub Security Advisories

GHSA-gmrw-vh4q-4fvv

WeKan versions prior to 8.19 contain an LDAP filter injection vulnerability in LDAP...

https://github.com/advisories/GHSA-gmrw-vh4q-4fvv

WeKan versions prior to 8.19 contain an LDAP filter injection vulnerability in LDAP authentication. User-supplied username input is incorporated into LDAP search filters and DN-related values without adequate escaping, allowing an attacker to manipulate LDAP queries during authentication.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-25560
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-25560",
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "dateUpdated": "2026-02-07T21:56:19.152Z",
    "dateReserved": "2026-02-02T20:12:33.396Z",
    "datePublished": "2026-02-07T21:56:19.152Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck",
        "dateUpdated": "2026-02-07T21:56:19.152Z"
      },
      "title": "WeKan < 8.19 LDAP Authentication Filter Injection",
      "descriptions": [
        {
          "lang": "en",
          "value": "WeKan versions prior to 8.19 contain an LDAP filter injection vulnerability in LDAP authentication. User-supplied username input is incorporated into LDAP search filters and DN-related values without adequate escaping, allowing an attacker to manipulate LDAP queries during authentication.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "WeKan versions prior to 8.19 contain an LDAP filter injection vulnerability in LDAP authentication. User-supplied username input is incorporated into LDAP search filters and DN-related values without adequate escaping, allowing an attacker to manipulate LDAP queries during authentication."
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "WeKan",
          "product": "WeKan",
          "repo": "https://github.com/wekan/wekan",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0",
              "status": "affected",
              "versionType": "semver",
              "lessThan": "8.19"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-90 Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')",
              "cweId": "CWE-90",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://github.com/wekan/wekan/commit/0b0e16c3eae28bbf453d33a81a9c58ce7db6d5bb",
          "tags": [
            "patch"
          ]
        },
        {
          "url": "https://wekan.fi/",
          "tags": [
            "product"
          ]
        },
        {
          "url": "https://www.vulncheck.com/advisories/wekan-ldap-authentication-filter-injection",
          "tags": [
            "third-party-advisory"
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Joshua Rogers",
          "type": "finder"
        }
      ]
    }
  }
}