WeKan before 8.35 contains a missing authorization vulnerability in the Integration REST API endpoints that allows authenticated board members to perform administrative actions without proper privilege verification. Attackers can enumerate integrations including webhook URLs, create new integrations, modify or delete existing integrations, and manage integration activities by exploiting insufficient authorization checks in the JsonRoutes REST handlers.
https://www.vulncheck.com/advisories/wekan-missing-authorization-via-integration-rest-api
https://github.com/wekan/wekan/releases/tag/v8.35
https://github.com/wekan/wekan/commit/2cd702f48df2b8aef0e7381685f8e089986a18a4
Published: 2026-04-22
Updated: 2026-04-22
Base Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:P
Severity: High
Base Score: 8.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
Severity: High
Base Score: 8.7
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
Severity: High