WebErpMesv2 is a Resource Management and Manufacturing execution system Web for industry. Prior to 1.19, the WebErpMesV2 application exposes multiple sensitive API endpoints without authentication middleware. An unauthenticated remote attacker can read business-critical data including companies, quotes, orders, tasks, and whiteboards. Limited write access allows creation of company records and full manipulation of collaboration whiteboards. This vulnerability is fixed in 1.19.
References
| Link | Resource |
|---|---|
| https://github.com/SMEWebify/WebErpMesv2/commit/3a7ab1c95d1d1c8f7c62c84bc87b3666ecd2fa23 | Patch |
| https://github.com/SMEWebify/WebErpMesv2/security/advisories/GHSA-pp68-5pc2-hv7w | Exploit Patch Vendor Advisory |
| https://github.com/SMEWebify/WebErpMesv2/security/advisories/GHSA-pp68-5pc2-hv7w | Exploit Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-12 22:16
Updated : 2026-01-21 19:11
NVD link : CVE-2026-22788
Mitre link : CVE-2026-22788
CVE.ORG link : CVE-2026-22788
JSON object : View
Products Affected
wem-project
- wem
CWE
CWE-306
Missing Authentication for Critical Function
