CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Lifecycle Timeline
4Description
Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.46, Kanboard is vulnerable to username enumeration and IP spoofing-based brute-force protection bypass. By analyzing login behavior and abusing trusted HTTP headers, an attacker can determine valid usernames and circumvent rate-limiting or blocking mechanisms. Any organization running a publicly accessible Kanboard instance is affected, especially if relying on IP-based protections like Fail2Ban or CAPTCHA for login rate-limiting. Attackers with access to the login page can exploit this flaw to enumerate valid usernames and bypass IP-based blocking mechanisms, putting all user accounts at higher risk of brute-force or credential stuffing attacks. Version 1.2.46 contains a patch for the issue.
Analysis
A remote code execution vulnerability in Kanboard (CVSS 5.3). Remediation should follow standard vulnerability management procedures. Vendor patch is available.
Technical Context
Vulnerability type: remote code execution. Affects Kanboard.
Affected Products
['Kanboard']
Remediation
Apply the vendor-supplied patch immediately.
Priority Score
Vendor Status
Debian
Bug #1112362| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| forky, sid | fixed | 1.2.51+ds-1 | - |
| (unstable) | fixed | 1.2.47+ds-1 | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-19116