๐Ÿ” CVE Alert

CVE-2026-30845

UNKNOWN 0.0

Wekan Exposes Sensitive Data through Lack of Field Filtering During Board Publication

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Wekan is an open source kanban tool built with Meteor. In versions 8.31.0 through 8.33, the board composite publication in Wekan publishes all integration data for a board without any field filtering, exposing sensitive fields including webhook URLs and authentication tokens to any subscriber. Since board publications are accessible to all board members regardless of their role (including read-only and comment-only users), and even to unauthenticated DDP clients for public boards, any user who can access a board can retrieve its webhook credentials. This token leak allows attackers to make unauthenticated requests to the exposed webhooks, potentially triggering unauthorized actions in connected external services. This issue has been fixed in version 8.34.

CWE CWE-200 CWE-862
Vendor wekan
Product wekan
Published Mar 6, 2026
Last Updated Mar 9, 2026
Stay Ahead of the Next One

Get instant alerts for wekan wekan

Be the first to know when new unknown vulnerabilities affecting wekan wekan are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Wekan / Wekan
>= 8.31.0, < 8.34

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
securitylab.github.com: https://securitylab.github.com/advisories/GHSL-2026-036_Wekan/ github.com: https://github.com/wekan/wekan/commit/8c00adc6b865653bd717a946dd646eb54ac78c9c github.com: https://github.com/wekan/wekan/releases/tag/v8.34