CVE-2026-41455:
WeKan before 8.35 contains a server-side request forgery vulnerability in webhook integration URL handling where the url schema field accepts any string without protocol restriction or destination validation. Attackers who can create or modify integrations can set webhook URLs to internal network addresses, causing the server to issue HTTP POST requests to attacker-controlled internal targets with full board event payloads, and can additionally exploit response handling to overwrite arbitrary comment text without authorization checks.
Score
A numerical rating that indicates how dangerous this vulnerability is.
8.5High- Published Date:Apr 22, 2026
- CISA KEV Date:*No Data*
- Industries Affected:20
Exploitability
- Score:3.1
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:LOW
- User Interaction:NONE
- Scope:CHANGED
Impact
- Score:4.7
- Confidentiality Impact:HIGH
- Integrity Impact:LOW
- Availability Impact:NONE
Description Preview
WeKan before 8.35 contains a server-side request forgery vulnerability in webhook integration URL handling where the url schema field accepts any string without protocol restriction or destination validation. Attackers who can create or modify integrations can set webhook URLs to internal network addresses, causing the server to issue HTTP POST requests to attacker-controlled internal targets with full board event payloads, and can additionally exploit response handling to overwrite arbitrary comment text without authorization checks.
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.