Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-30847— Wekan Credential Leak via notificationUsers Publication Exposes Password Hashes and Session Tokens

EPSS 0.03% · P10
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-30847

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Wekan Credential Leak via notificationUsers Publication Exposes Password Hashes and Session Tokens
Source: NVD (National Vulnerability Database)
Vulnerability Description
Wekan is an open source kanban tool built with Meteor. In versions 8.31.0 through 8.33, the notificationUsers publication in Wekan publishes user documents with no field filtering, causing the ReactiveCache.getUsers() call to return all fields including highly sensitive data such as bcrypt password hashes, active session login tokens, email verification tokens, full email addresses, and any stored OAuth tokens. Unlike Meteor's default auto-publication which strips the services field for security, custom publications return whatever fields the cursor contains, meaning all subscribers receive the complete user documents. Any authenticated user who triggers this publication can harvest credentials and active session tokens for other users, enabling password cracking, session hijacking, and full account takeover. This issue has been fixed in version 8.34.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
WeKan 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WeKan是WeKan开源的一个看板应用程序。 WeKan 8.31.0至8.33版本存在授权问题漏洞,该漏洞源于用户文档发布时缺少字段过滤,可能导致凭据和会话令牌泄露。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
WekanWekan >= 8.31.0, < 8.34 -

II. Public POCs for CVE-2026-30847

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-30847

登录查看更多情报信息。

Same Patch Batch · Wekan · 2026-03-06 · 5 CVEs total

CVE-2026-30846Wekan Exposes All Global Webhook Integrations through globalwebhooks Publication
CVE-2026-30845Wekan Exposes Sensitive Data through Lack of Field Filtering During Board Publication
CVE-2026-30844Wekan Vulnerable to SSRF through Lack of Validation or Filtering in Attachment URL Loading
CVE-2026-30843Wekan has Cross-Board IDOR in Custom Fields Update Endpoints

IV. Related Vulnerabilities

V. Comments for CVE-2026-30847

No comments yet


Leave a comment