top of page
perceptive_background_267k.jpg

WeKan before 8.35 contains a server-side request forgery vulnerability in webhook integration URL handling where the url schema field accepts any string without…

Published:

21 april 2026 om 22:00:00

Alert date:

22 april 2026 om 23:01:43

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

WeKan versions before 8.35 contain a server-side request forgery (SSRF) vulnerability in webhook integration URL handling. The vulnerability allows attackers who can create or modify integrations to set webhook URLs to internal network addresses. This causes the server to issue HTTP POST requests to attacker-controlled internal targets with full board event payloads. Additionally, attackers can exploit response handling to overwrite arbitrary comment text without proper authorization checks. The vulnerability stems from the url schema field accepting any string without protocol restriction or destination validation.

Technical details

Mitigation steps:

Affected products:

WeKan

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page