Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 18 Dec 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:* |
Tue, 16 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-287 CWE-400 |
|
| Metrics |
cvssV3_1
|
Mon, 15 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wekan Project
Wekan Project wekan |
|
| Vendors & Products |
Wekan Project
Wekan Project wekan |
Mon, 15 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Wekan The Open Source kanban board system up to version 18.15, fixed in 18.16. Attachment upload API treats the Authorization bearer value as a userId and enters a non-terminating body-handling branch for any non-empty bearer token, enabling trivial application-layer DoS and latent identity-spoofing. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-16T15:55:14.660Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65781
Updated: 2025-12-16T15:53:59.144Z
Status : Analyzed
Published: 2025-12-15T14:15:57.567
Modified: 2025-12-18T01:35:29.167
Link: CVE-2025-65781
No data.
OpenCVE Enrichment
Updated: 2025-12-15T21:33:41Z