CVE-2026-25924

HIGH
2026-02-11 [email protected]
8.4
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 12, 2026 - 22:02 vuln.today
PoC Detected
Feb 13, 2026 - 21:30 vuln.today
Public exploit code
Patch Released
Feb 13, 2026 - 21:30 nvd
Patch available
CVE Published
Feb 11, 2026 - 21:16 nvd
HIGH 8.4

Description

Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, a security control bypass vulnerability in Kanboard allows an authenticated administrator to achieve full Remote Code Execution (RCE). Although the application correctly hides the plugin installation interface when the PLUGIN_INSTALLER configuration is set to false, the underlying backend endpoint fails to verify this security setting. An attacker can exploit this oversight to force the server to download and install a malicious plugin, leading to arbitrary code execution. This vulnerability is fixed in 1.2.50.

Analysis

Remote code execution in Kanboard prior to 1.2.50 allows authenticated administrators to bypass plugin installation restrictions and execute arbitrary code on the server. The vulnerability stems from a configuration validation flaw where the PLUGIN_INSTALLER setting is enforced only in the UI but not validated at the backend endpoint, enabling an attacker to force installation of malicious plugins. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all Kanboard instances and verify current versions; restrict administrative access to trusted personnel only. Within 7 days: Apply vendor patch to upgrade all instances to version 1.2.50 or later; validate patch deployment in a test environment first. …

Sign in for detailed remediation steps.

Priority Score

62
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +42
POC: +20

Share

CVE-2026-25924 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy