Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 18 Dec 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:* |
Tue, 16 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Mon, 15 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wekan Project
Wekan Project wekan |
|
| Vendors & Products |
Wekan Project
Wekan Project wekan |
Mon, 15 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Wekan The Open Source kanban board system up to version 18.15, fixed in 18.16. Uploaded attachments can be served with attacker-controlled Content-Type (text/html), allowing execution of attacker-supplied HTML/JS in the application's origin and enabling session/token theft and CSRF actions. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-16T15:41:59.259Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65778
Updated: 2025-12-16T15:41:53.864Z
Status : Analyzed
Published: 2025-12-15T14:15:57.227
Modified: 2025-12-18T01:44:38.580
Link: CVE-2025-65778
No data.
OpenCVE Enrichment
Updated: 2025-12-15T21:33:34Z