A vulnerability classified as problematic has been found in WeKan up to 8.18. Affected by this issue is some unknown functionality of the file server/publications/attachments.js of the component Attachment Metadata Handler. This manipulation causes information exposure through discrepancy.
This vulnerability is tracked as CVE-2026-25562. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in WeKan up to 8.18. Affected by this vulnerability is an unknown functionality of the file models/cardComments.js of the component Card Comment Creation API. The manipulation results in authorization bypass.
This vulnerability is identified as CVE-2026-25567. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in WeKan up to 8.18. Affected is an unknown function of the file models/cards.js of the component Card Move Handler. The manipulation leads to incorrect authorization.
This vulnerability is referenced as CVE-2026-25566. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in WeKan up to 8.18. This impacts an unknown function of the component Update API. Executing a manipulation can lead to incorrect authorization.
The identification of this vulnerability is CVE-2026-25565. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in WeKan up to 8.18. This affects an unknown function of the file models/checklists.js of the component Checklist Handler. Performing a manipulation results in authorization bypass.
This vulnerability was named CVE-2026-25564. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in WeKan up to 8.18. The impacted element is an unknown function of the file models/checklists.js. Such manipulation leads to authorization bypass.
This vulnerability is uniquely identified as CVE-2026-25563. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in WeKan up to 8.18. It has been rated as critical. The affected element is an unknown function of the file server/routes/attachmentApi.js of the component Attachment Upload API. This manipulation causes incorrect authorization.
This vulnerability is handled as CVE-2026-25561. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in WeKan up to 8.18. It has been declared as critical. Impacted is an unknown function of the file packages/wekan-ldap/server/ldap.js. The manipulation results in ldap injection.
This vulnerability is known as CVE-2026-25560. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in WeKan up to 8.18. It has been classified as critical. This issue affects some unknown processing of the file models/boards.js. The manipulation leads to incorrect authorization.
This vulnerability is traded as CVE-2026-25568. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in WeKan up to 8.19 and classified as problematic. This vulnerability affects unknown code of the component Migration Operation Handler. Executing a manipulation can lead to incorrect authorization.
This vulnerability appears as CVE-2026-25859. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability has been found in macrozheng mall up to 1.0.3 and classified as critical. This affects an unknown part. Performing a manipulation results in weak password recovery.
This vulnerability is reported as CVE-2026-25858. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability, which was classified as critical, was found in Tenda G300-F up to 16.01.14.2. Affected by this issue is the function formSetWanDiag of the component Management Interface. Such manipulation leads to os command injection.
This vulnerability is documented as CVE-2026-25857. The attack can be executed remotely. There is not any exploit available.
A vulnerability, which was classified as critical, was found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function loadAllLoginfo/deleteLoginfo/batchDeleteLoginfo of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\LoginfoController.java of the component Log Info Handler. The manipulation results in improper authorization.
This vulnerability is reported as CVE-2026-2107. The attack can be launched remotely. Moreover, an exploit is present.
This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability has been found in jsbroks COCO Annotator up to 0.11.1 and classified as problematic. This impacts an unknown function of the file /api/info/long_task of the component Endpoint. This manipulation causes denial of service.
This vulnerability appears as CVE-2026-2108. The attack may be initiated remotely. In addition, an exploit is available.
It is advisable to implement restrictive firewalling.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in jsbroks COCO Annotator up to 0.11.1 and classified as problematic. Affected is an unknown function of the file /api/undo/ of the component Delete Category Handler. Such manipulation of the argument ID leads to improper authorization.
This vulnerability is traded as CVE-2026-2109. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.