CVE-2026-30855
Published: 07 March 2026
Description
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.2, an authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modify, or delete any tenant by ID.…
more
Since account registration is open to the public, this vulnerability allows any unauthenticated attacker to register an account and subsequently exploit the system. This enables cross-tenant account takeover and destruction, making the impact critical. This issue has been patched in version 0.3.2.
Mitigating Controls (NIST 800-53 r5)AI
AC-3 enforces approved authorizations for access to system resources, directly preventing the authorization bypass allowing any authenticated user to manage any tenant.
AC-6 applies least privilege to restrict users to their own tenant resources only, mitigating cross-tenant takeover and destruction.
AC-24 requires explicit access control decisions for resources by role or personnel, addressing the failure to authorize tenant management operations properly.
Security SummaryAI
CVE-2026-30855 is an authorization bypass vulnerability (CWE-284) in the tenant management endpoints of WeKnora, an LLM-powered framework designed for deep document understanding and semantic retrieval. It affects WeKnora versions prior to 0.3.2 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts.
The vulnerability allows any authenticated user to read, modify, or delete any tenant by ID, bypassing proper authorization checks. Since account registration is open to the public, unauthenticated attackers can register an account and immediately exploit the issue, enabling cross-tenant account takeover and destruction with critical consequences.
The vulnerability has been patched in WeKnora version 0.3.2. Additional details are available in the GitHub security advisory at https://github.com/Tencent/WeKnora/security/advisories/GHSA-ccj6-79j6-cq5q.
As an LLM-powered framework, CVE-2026-30855 highlights risks in multi-tenant AI/ML systems for semantic retrieval and document understanding.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other AI Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Matched keywords: llm
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authorization bypass in public-facing tenant management endpoints of WeKnora web framework directly enables exploitation of public-facing applications for unauthorized read/modify/delete access to any tenant.