2026-02-07 21:58CVE-2026-25567VulnCheck
PUBLISHED5.2CWE-639

WeKan < 8.19 Card Comment Author Spoofing via User-controlled authorId

WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card comment creation API. The endpoint accepts an authorId from the request body, allowing an authenticated user to spoof the recorded comment author by supplying another user's identifier.

Problem type

Affected products

WeKan

WeKan

< 8.19 - AFFECTED

References

GitHub Security Advisories

GHSA-9w3f-qqh3-w7fc

WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card...

https://github.com/advisories/GHSA-9w3f-qqh3-w7fc

WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card comment creation API. The endpoint accepts an authorId from the request body, allowing an authenticated user to spoof the recorded comment author by supplying another user's identifier.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-25567
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-25567",
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "dateUpdated": "2026-02-07T21:58:53.680Z",
    "dateReserved": "2026-02-02T20:12:33.397Z",
    "datePublished": "2026-02-07T21:58:53.680Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck",
        "dateUpdated": "2026-02-07T21:58:53.680Z"
      },
      "title": "WeKan < 8.19 Card Comment Author Spoofing via User-controlled authorId",
      "descriptions": [
        {
          "lang": "en",
          "value": "WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card comment creation API. The endpoint accepts an authorId from the request body, allowing an authenticated user to spoof the recorded comment author by supplying another user's identifier.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card comment creation API. The endpoint accepts an authorId from the request body, allowing an authenticated user to spoof the recorded comment author by supplying another user's identifier."
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "WeKan",
          "product": "WeKan",
          "repo": "https://github.com/wekan/wekan",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0",
              "status": "affected",
              "versionType": "semver",
              "lessThan": "8.19"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-639 Authorization Bypass Through User-Controlled Key",
              "cweId": "CWE-639",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://github.com/wekan/wekan/commit/67cb47173c1a152d9eaf5469740992b2dacdf62d",
          "tags": [
            "patch"
          ]
        },
        {
          "url": "https://wekan.fi/",
          "tags": [
            "product"
          ]
        },
        {
          "url": "https://www.vulncheck.com/advisories/wekan-card-comment-author-spoofing-via-user-controlled-authorid",
          "tags": [
            "third-party-advisory"
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Joshua Rogers",
          "type": "finder"
        }
      ]
    }
  }
}