INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global supply_chain Software Development and Technology CRITICAL 35m Global apt Multiple sectors HIGH 2h Global general Digital Content & Intellectual Property MEDIUM 3h Global malware Technology and Software Development CRITICAL 3h Global ddos Technology and Social Media HIGH 3h Global phishing Financial Services, Telecommunications, General Public HIGH 4h Global supply_chain Software Development and Technology CRITICAL 5h Global apt Multiple sectors / Critical Infrastructure CRITICAL 5h Global malware Financial Services CRITICAL 5h Global general Software/Technology LOW 5h Global supply_chain Software Development and Technology CRITICAL 35m Global apt Multiple sectors HIGH 2h Global general Digital Content & Intellectual Property MEDIUM 3h Global malware Technology and Software Development CRITICAL 3h Global ddos Technology and Social Media HIGH 3h Global phishing Financial Services, Telecommunications, General Public HIGH 4h Global supply_chain Software Development and Technology CRITICAL 5h Global apt Multiple sectors / Critical Infrastructure CRITICAL 5h Global malware Financial Services CRITICAL 5h Global general Software/Technology LOW 5h Global supply_chain Software Development and Technology CRITICAL 35m Global apt Multiple sectors HIGH 2h Global general Digital Content & Intellectual Property MEDIUM 3h Global malware Technology and Software Development CRITICAL 3h Global ddos Technology and Social Media HIGH 3h Global phishing Financial Services, Telecommunications, General Public HIGH 4h Global supply_chain Software Development and Technology CRITICAL 5h Global apt Multiple sectors / Critical Infrastructure CRITICAL 5h Global malware Financial Services CRITICAL 5h Global general Software/Technology LOW 5h
Vulnerabilities

CVE-2026-25859

High
Wekan versions prior to 8.20 allow non-administrative users to access migration functionality due to insufficient permission checks, potentially resulting in unauthorized migration operations.
CWE-863 — Weakness Type
Published: Feb 7, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

Wekan versions prior to 8.20 allow non-administrative users to access migration functionality due to insufficient permission checks, potentially resulting in unauthorized migration operations.

🤖 AI Executive Summary

Wekan versions before 8.20 contain an authorization bypass vulnerability (CVE-2026-25859) allowing non-administrative users to access sensitive migration functionality. With a CVSS score of 8.8, this vulnerability could enable unauthorized data migration operations, potentially leading to data exfiltration or system compromise. Organizations using Wekan for project management should prioritize immediate patching to version 8.20 or later.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 22, 2026 20:53
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi government agencies, educational institutions, and private sector organizations using Wekan for project collaboration. Government entities under NCA oversight and ARAMCO's project management teams are particularly vulnerable. The authorization bypass could allow unauthorized personnel to migrate sensitive project data, blueprints, or strategic information. Financial institutions and healthcare organizations using Wekan for internal project tracking face data confidentiality risks. The vulnerability is especially critical for organizations handling classified or sensitive information related to Vision 2030 initiatives.
🏢 Affected Saudi Sectors
Government Education Banking and Financial Services Energy (ARAMCO) Healthcare Telecommunications Manufacturing Consulting and Professional Services
⚖️ Saudi Risk Score (AI)
8.2
/ 10.0
🔧 Remediation Steps (English)
1. IMMEDIATE ACTIONS:
- Identify all Wekan instances in your environment and document their versions
- Restrict access to Wekan migration functionality at the network level if possible
- Review audit logs for unauthorized migration attempts or suspicious user activities
- Disable migration features if not actively required

2. PATCHING GUIDANCE:
- Upgrade all Wekan installations to version 8.20 or later immediately
- Test patches in non-production environments first
- Schedule maintenance windows for production upgrades
- Verify proper permission controls after patching

3. COMPENSATING CONTROLS:
- Implement role-based access control (RBAC) at the application level
- Monitor and log all migration-related activities
- Restrict database access to authorized administrators only
- Implement network segmentation to limit lateral movement

4. DETECTION RULES:
- Alert on any migration function calls from non-administrative user accounts
- Monitor for unusual data export or backup activities
- Track changes to user permissions and role assignments
- Log all API calls to migration endpoints with source IP and user context
🔧 خطوات المعالجة (العربية)
1. الإجراءات الفورية:
- حدد جميع مثيلات Wekan في بيئتك وقثّق إصداراتها
- قيّد الوصول إلى وظائف ترحيل Wekan على مستوى الشبكة إن أمكن
- راجع سجلات التدقيق للبحث عن محاولات ترحيل غير مصرح بها أو أنشطة مريبة
- عطّل ميزات الترحيل إذا لم تكن مطلوبة بنشاط

2. إرشادات التصحيح:
- ترقية جميع تثبيتات Wekan إلى الإصدار 8.20 أو أحدث فوراً
- اختبر التصحيحات في بيئات غير الإنتاج أولاً
- جدول نوافذ الصيانة لترقيات الإنتاج
- تحقق من التحكم الصحيح في الأذونات بعد التصحيح

3. الضوابط البديلة:
- تطبيق التحكم في الوصول القائم على الأدوار (RBAC) على مستوى التطبيق
- مراقبة وتسجيل جميع الأنشطة المتعلقة بالترحيل
- تقييد الوصول إلى قاعدة البيانات للمسؤولين المصرح لهم فقط
- تطبيق تقسيم الشبكة لتحديد الحركة الجانبية

4. قواعد الكشف:
- تنبيه عند أي استدعاءات وظائف ترحيل من حسابات المستخدمين غير الإداريين
- مراقبة أنشطة تصدير البيانات أو النسخ الاحتياطي غير العادية
- تتبع التغييرات في أذونات المستخدم وتعيينات الأدوار
- تسجيل جميع استدعاءات API لنقاط نهاية الترحيل مع IP المصدر وسياق المستخدم
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.5.1.1 - User Access Management ECC 2024 A.5.2.1 - User Registration and De-registration ECC 2024 A.5.3.1 - Access Rights Review ECC 2024 A.8.1.1 - Information Security Awareness and Training ECC 2024 A.12.4.1 - Event Logging ECC 2024 A.12.4.3 - Administrator and Operator Logs
🔵 SAMA CSF
SAMA CSF ID.AC-1 - Access Control Policy SAMA CSF ID.AC-2 - Physical and Logical Access Controls SAMA CSF DE.AE-1 - Audit Logs SAMA CSF DE.AE-3 - Unauthorized Activities Detection SAMA CSF PR.AC-1 - Identities and Credentials Management
🟡 ISO 27001:2022
ISO 27001:2022 A.5.2 - User Access Management ISO 27001:2022 A.5.3 - Access Control ISO 27001:2022 A.8.2 - Information Security Awareness ISO 27001:2022 A.8.3 - Information Security Awareness, Education and Training ISO 27001:2022 A.12.4 - Logging
📦 Affected Products / CPE 1 entries
wekan_project:wekan
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-863
Exploit No
Patch ✓ Yes
Published 2026-02-07
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
8.2
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
patch-available CWE-863
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.