Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-30843— Wekan has Cross-Board IDOR in Custom Fields Update Endpoints

EPSS 0.03% · P9
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-30843

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Wekan has Cross-Board IDOR in Custom Fields Update Endpoints
Source: NVD (National Vulnerability Database)
Vulnerability Description
Wekan is an open source kanban tool built with Meteor. Versions 8.32 and 8.33 have a critical Insecure Direct Object Reference (IDOR) issue which could allow unauthorized users to modify custom fields across boards through its custom fields update endpoints, potentially leading to unauthorized data manipulation. The PUT /api/boards/:boardId/custom-fields/:customFieldId endpoint in Wekan validates that the authenticated user has access to the specified boardId, but the subsequent database update uses only the custom field's _id as a filter without confirming the field actually belongs to that board. This means an attacker who owns any board can modify custom fields on any other board by supplying a foreign custom field ID, and the same flaw exists in the POST, PUT, and DELETE endpoints for dropdown items under custom fields. The required custom field IDs can be obtained by exporting a board (which only needs read access), since the exported JSON includes the IDs of all board components. The authorization check is performed against the wrong resource, allowing cross-board custom field manipulation. This issue has been fixed in version 8.34.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
通过用户控制密钥绕过授权机制
Source: NVD (National Vulnerability Database)
Vulnerability Title
WeKan 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WeKan是WeKan开源的一个看板应用程序。 Wekan 8.32版本和8.33版本存在安全漏洞,该漏洞源于不安全的直接对象引用,可能导致未经授权的用户跨看板修改自定义字段。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
WekanWekan >= 8.32, < 8.34 -
WekanWekan >= 8.32, < 8.34 -

II. Public POCs for CVE-2026-30843

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-30843

登录查看更多情报信息。

Same Patch Batch · Wekan · 2026-03-06 · 5 CVEs total

CVE-2026-30846Wekan Exposes All Global Webhook Integrations through globalwebhooks Publication
CVE-2026-30845Wekan Exposes Sensitive Data through Lack of Field Filtering During Board Publication
CVE-2026-30844Wekan Vulnerable to SSRF through Lack of Validation or Filtering in Attachment URL Loading
CVE-2026-30847Wekan Credential Leak via notificationUsers Publication Exposes Password Hashes and Sessio

IV. Related Vulnerabilities

V. Comments for CVE-2026-30843

No comments yet


Leave a comment