WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card comment creation API. The endpoint accepts an authorId from the request body, allowing an authenticated user to spoof the recorded comment author by supplying another user's identifier.
WeKan < 8.19 Card Comment Author Spoofing via User-controlled authorId
Problem type
Affected products
WeKan
< 8.19 - AFFECTED
References
https://github.com/wekan/wekan/commit/67cb47173c1a152d9eaf5469740992b2dacdf62d
https://wekan.fi/
https://www.vulncheck.com/advisories/wekan-card-comment-author-spoofing-via-user-controlled-authorid
GitHub Security Advisories
GHSA-9w3f-qqh3-w7fc
WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card...
https://github.com/advisories/GHSA-9w3f-qqh3-w7fcWeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card comment creation API. The endpoint accepts an authorId from the request body, allowing an authenticated user to spoof the recorded comment author by supplying another user's identifier.
https://nvd.nist.gov/vuln/detail/CVE-2026-25567
https://github.com/wekan/wekan/commit/67cb47173c1a152d9eaf5469740992b2dacdf62d
https://wekan.fi
https://www.vulncheck.com/advisories/wekan-card-comment-author-spoofing-via-user-controlled-authorid
https://github.com/advisories/GHSA-9w3f-qqh3-w7fc
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-25567Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-25567",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2026-02-07T21:58:53.680Z",
"dateReserved": "2026-02-02T20:12:33.397Z",
"datePublished": "2026-02-07T21:58:53.680Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2026-02-07T21:58:53.680Z"
},
"title": "WeKan < 8.19 Card Comment Author Spoofing via User-controlled authorId",
"descriptions": [
{
"lang": "en",
"value": "WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card comment creation API. The endpoint accepts an authorId from the request body, allowing an authenticated user to spoof the recorded comment author by supplying another user's identifier.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card comment creation API. The endpoint accepts an authorId from the request body, allowing an authenticated user to spoof the recorded comment author by supplying another user's identifier."
}
]
}
],
"affected": [
{
"vendor": "WeKan",
"product": "WeKan",
"repo": "https://github.com/wekan/wekan",
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "semver",
"lessThan": "8.19"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-639 Authorization Bypass Through User-Controlled Key",
"cweId": "CWE-639",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://github.com/wekan/wekan/commit/67cb47173c1a152d9eaf5469740992b2dacdf62d",
"tags": [
"patch"
]
},
{
"url": "https://wekan.fi/",
"tags": [
"product"
]
},
{
"url": "https://www.vulncheck.com/advisories/wekan-card-comment-author-spoofing-via-user-controlled-authorid",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Joshua Rogers",
"type": "finder"
}
]
}
}
}