


Perceptive Security
SOC/SIEM Consultancy

WeKan before 8.35 contains a server-side request forgery vulnerability in webhook integration URL handling where the url schema field accepts any string without…
Published:
21 April 2026 at 22:00:00
Alert date:
22 April 2026 at 23:01:43
Source:
nvd.nist.gov
Web Technologies, Enterprise Applications
WeKan versions before 8.35 contain a server-side request forgery (SSRF) vulnerability in webhook integration URL handling. The vulnerability allows attackers who can create or modify integrations to set webhook URLs to internal network addresses. This causes the server to issue HTTP POST requests to attacker-controlled internal targets with full board event payloads. Additionally, attackers can exploit response handling to overwrite arbitrary comment text without proper authorization checks. The vulnerability stems from the url schema field accepting any string without protocol restriction or destination validation.
Technical details
Mitigation steps:
Affected products:
WeKan
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-41455
https://github.com/wekan/wekan/commit/2cd702f48df2b8aef0e7381685f8e089986a18a4
https://github.com/wekan/wekan/releases/tag/v8.35
https://www.vulncheck.com/advisories/wekan-ssrf-via-webhook-url
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
