{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2209","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-08T01:14:09.539Z","datePublished":"2026-02-08T01:14:34.308Z","dateUpdated":"2026-02-23T09:54:44.601Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:54:44.601Z"},"title":"WeKan Custom Translation translationBody.js setCreateTranslation improper authorization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-285","lang":"en","description":"Improper Authorization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"n/a","product":"WeKan","versions":[{"version":"8.0","status":"affected"},{"version":"8.1","status":"affected"},{"version":"8.2","status":"affected"},{"version":"8.3","status":"affected"},{"version":"8.4","status":"affected"},{"version":"8.5","status":"affected"},{"version":"8.6","status":"affected"},{"version":"8.7","status":"affected"},{"version":"8.8","status":"affected"},{"version":"8.9","status":"affected"},{"version":"8.10","status":"affected"},{"version":"8.11","status":"affected"},{"version":"8.12","status":"affected"},{"version":"8.13","status":"affected"},{"version":"8.14","status":"affected"},{"version":"8.15","status":"affected"},{"version":"8.16","status":"affected"},{"version":"8.17","status":"affected"},{"version":"8.18","status":"affected"},{"version":"8.19","status":"unaffected"}],"modules":["Custom Translation Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in WeKan up to 8.18. The affected element is the function setCreateTranslation of the file client/components/settings/translationBody.js of the component Custom Translation Handler. The manipulation results in improper authorization. The attack can be launched remotely. Upgrading to version 8.19 is sufficient to fix this issue. The patch is identified as f244a43771f6ebf40218b83b9f46dba6b940d7de. It is suggested to upgrade the affected component."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:OF/RC:C"}}],"timeline":[{"time":"2026-02-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-08T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-12T08:47:12.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"MegaManSec (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.344923","name":"VDB-344923 | WeKan Custom Translation translationBody.js setCreateTranslation improper authorization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.344923","name":"VDB-344923 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.752269","name":"Submit #752269 | Wekan <8.20 IDOR in setCreateTranslation. Non-admin could change Custom Tran","tags":["third-party-advisory"]},{"url":"https://github.com/wekan/wekan/commit/f244a43771f6ebf40218b83b9f46dba6b940d7de","tags":["patch"]},{"url":"https://github.com/wekan/wekan/releases/tag/v8.19","tags":["patch"]},{"url":"https://github.com/wekan/wekan/","tags":["product"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-10T19:43:12.695364Z","id":"CVE-2026-2209","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-10T19:43:24.704Z"}}]}}