An issue was discovered in Wekan The Open Source kanban board system up to version 18.15, fixed in 18.16. Uploaded attachments can be served with attacker-controlled Content-Type (text/html), allowing execution of attacker-supplied HTML/JS in the application's origin and enabling session/token theft and CSRF actions.
References
| Link | Resource |
|---|---|
| https://github.com/wekan/wekan | Product |
| https://github.com/wekan/wekan/blob/main/CHANGELOG.md#v816-2025-11-02-wekan--release | Release Notes |
| https://github.com/wekan/wekan/commit/e9a727301d7b4f1689a703503df668c0f4f4cab8 | Patch |
| https://wekan.fi/hall-of-fame/spacebleed/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-12-15 14:15
Updated : 2025-12-18 01:44
NVD link : CVE-2025-65778
Mitre link : CVE-2025-65778
CVE.ORG link : CVE-2025-65778
JSON object : View
Products Affected
wekan_project
- wekan
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
