Kanboard

14 CVEs product

Monthly

CVE-2026-33058 MEDIUM PATCH This Month

An authenticated SQL injection vulnerability exists in Kanboard project management software prior to version 1.2.51. Authenticated attackers with permission to add users to a project can exploit this vulnerability to dump the entire Kanboard database, potentially exposing sensitive project data, user credentials, and application secrets. The vulnerability is confirmed under active tracking by Debian (2 releases) and Ubuntu (medium priority), with a GitHub Security Advisory published.

SQLi Ubuntu Debian Kanboard
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-29056 HIGH PATCH This Week

Kanboard project management software contains a privilege escalation vulnerability in its user invite registration endpoint that allows invited users to inject the 'role=app-admin' parameter during account creation, granting themselves administrator privileges. This affects all Kanboard versions prior to 1.2.51. The vulnerability has documented proof-of-concept exploitation capability (CVSS E:P indicates PoC exists) and carries a CVSS 4.0 score of 7.0 with high integrity impact to both the vulnerable system and subsequent components.

Code Injection Ubuntu Debian Kanboard
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-25531 MEDIUM POC PATCH This Month

Kanboard versions prior to 1.2.50 allow authenticated users to duplicate tasks into projects they lack access permissions for due to insufficient validation in the TaskCreationController endpoint. This privilege escalation vulnerability enables users to move sensitive tasks across project boundaries they should not be able to access. Public exploit code exists for this incomplete fix of a prior authorization bypass vulnerability.

Authentication Bypass Kanboard
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-25924 HIGH POC PATCH This Week

Remote code execution in Kanboard prior to 1.2.50 allows authenticated administrators to bypass plugin installation restrictions and execute arbitrary code on the server. The vulnerability stems from a configuration validation flaw where the PLUGIN_INSTALLER setting is enforced only in the UI but not validated at the backend endpoint, enabling an attacker to force installation of malicious plugins. Public exploit code exists for this vulnerability.

RCE Kanboard
NVD GitHub
CVSS 3.1
8.4
EPSS
0.1%
CVE-2026-25530 MEDIUM POC PATCH This Month

Kanboard versions up to 1.2.50 is affected by authorization bypass through user-controlled key (CVSS 4.3).

Authentication Bypass Kanboard
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-24885 MEDIUM POC PATCH This Month

Kanboard versions prior to 1.2.50 contain a CSRF vulnerability in the ProjectPermissionController that accepts text/plain content instead of enforcing application/json, enabling attackers to modify project user roles through malicious forms. An authenticated admin visiting a malicious website could be tricked into unknowingly changing role assignments, potentially granting unauthorized access to projects. Public exploit code exists for this vulnerability, though a patch is available in version 1.2.50 and later.

CSRF Kanboard
NVD GitHub
CVSS 3.1
5.7
EPSS
0.0%
CVE-2026-21881 CRITICAL POC PATCH Act Now

Kanboard project management (through 1.2.48) has an authentication bypass when REVERSE_PROXY_AUTH is enabled. The application trusts HTTP headers for authentication without verifying the request came from the reverse proxy. Any attacker can impersonate any user including admins. PoC available, patch available.

Authentication Bypass Kanboard
NVD GitHub
CVSS 3.1
9.1
EPSS
0.3%
CVE-2026-21880 MEDIUM POC PATCH This Month

Kanboard versions 1.2.48 and earlier contain an LDAP injection vulnerability where unsanitized user input in the LDAP authentication mechanism allows attackers to enumerate users, extract sensitive attributes, and target specific accounts. Public exploit code exists for this vulnerability. The issue is resolved in version 1.2.49 and later.

Ldap Kanboard
NVD GitHub
CVSS 3.1
5.3
EPSS
0.2%
CVE-2026-21879 MEDIUM POC PATCH This Month

Open redirect vulnerability in Kanboard versions 1.2.48 and below allows attackers to bypass URL validation and redirect authenticated users to malicious websites through specially crafted URLs. Public exploit code exists for this vulnerability, which can be leveraged for phishing attacks and credential theft. The vulnerability is resolved in version 1.2.49.

Open Redirect Kanboard
NVD GitHub
CVSS 3.1
4.7
EPSS
0.0%
CVE-2025-55011 MEDIUM POC PATCH This Month

Kanboard is project management software that focuses on the Kanban methodology. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Path Traversal Kanboard
NVD GitHub
CVSS 3.1
6.4
EPSS
0.1%
CVE-2025-55010 CRITICAL POC PATCH Act Now

Kanboard is project management software that focuses on the Kanban methodology. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

PHP Deserialization RCE Kanboard
NVD GitHub
CVSS 3.1
9.1
EPSS
3.9%
CVE-2025-52576 MEDIUM PATCH This Month

A remote code execution vulnerability in Kanboard (CVSS 5.3). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Authentication Bypass Debian Kanboard
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-52560 HIGH POC PATCH This Week

Kanboard prior to version 1.2.46 contains a host header injection vulnerability that allows unauthenticated attackers to craft malicious password reset emails with attacker-controlled URLs when the application_url configuration is unset (default state). If a victim clicks the poisoned reset link, their password reset token is leaked to the attacker's domain, enabling complete account takeover including administrative accounts. This vulnerability requires user interaction (clicking a link) but affects all users initiating password resets on vulnerable instances, making it a practical and high-impact attack vector for account compromise.

Information Disclosure Kanboard
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2025-46825 LOW POC PATCH Monitor

Kanboard is project management software that focuses on the Kanban methodology. Rated low severity (CVSS 1.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

XSS Kanboard
NVD GitHub
CVSS 4.0
1.3
EPSS
0.2%
CVE-2026-33058
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

An authenticated SQL injection vulnerability exists in Kanboard project management software prior to version 1.2.51. Authenticated attackers with permission to add users to a project can exploit this vulnerability to dump the entire Kanboard database, potentially exposing sensitive project data, user credentials, and application secrets. The vulnerability is confirmed under active tracking by Debian (2 releases) and Ubuntu (medium priority), with a GitHub Security Advisory published.

SQLi Ubuntu Debian +1
NVD GitHub VulDB
CVE-2026-29056
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Kanboard project management software contains a privilege escalation vulnerability in its user invite registration endpoint that allows invited users to inject the 'role=app-admin' parameter during account creation, granting themselves administrator privileges. This affects all Kanboard versions prior to 1.2.51. The vulnerability has documented proof-of-concept exploitation capability (CVSS E:P indicates PoC exists) and carries a CVSS 4.0 score of 7.0 with high integrity impact to both the vulnerable system and subsequent components.

Code Injection Ubuntu Debian +1
NVD GitHub VulDB
CVE-2026-25531
EPSS 0% CVSS 4.3
MEDIUM POC PATCH This Month

Kanboard versions prior to 1.2.50 allow authenticated users to duplicate tasks into projects they lack access permissions for due to insufficient validation in the TaskCreationController endpoint. This privilege escalation vulnerability enables users to move sensitive tasks across project boundaries they should not be able to access. Public exploit code exists for this incomplete fix of a prior authorization bypass vulnerability.

Authentication Bypass Kanboard
NVD GitHub
CVE-2026-25924
EPSS 0% CVSS 8.4
HIGH POC PATCH This Week

Remote code execution in Kanboard prior to 1.2.50 allows authenticated administrators to bypass plugin installation restrictions and execute arbitrary code on the server. The vulnerability stems from a configuration validation flaw where the PLUGIN_INSTALLER setting is enforced only in the UI but not validated at the backend endpoint, enabling an attacker to force installation of malicious plugins. Public exploit code exists for this vulnerability.

RCE Kanboard
NVD GitHub
CVE-2026-25530
EPSS 0% CVSS 4.3
MEDIUM POC PATCH This Month

Kanboard versions up to 1.2.50 is affected by authorization bypass through user-controlled key (CVSS 4.3).

Authentication Bypass Kanboard
NVD GitHub
CVE-2026-24885
EPSS 0% CVSS 5.7
MEDIUM POC PATCH This Month

Kanboard versions prior to 1.2.50 contain a CSRF vulnerability in the ProjectPermissionController that accepts text/plain content instead of enforcing application/json, enabling attackers to modify project user roles through malicious forms. An authenticated admin visiting a malicious website could be tricked into unknowingly changing role assignments, potentially granting unauthorized access to projects. Public exploit code exists for this vulnerability, though a patch is available in version 1.2.50 and later.

CSRF Kanboard
NVD GitHub
CVE-2026-21881
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

Kanboard project management (through 1.2.48) has an authentication bypass when REVERSE_PROXY_AUTH is enabled. The application trusts HTTP headers for authentication without verifying the request came from the reverse proxy. Any attacker can impersonate any user including admins. PoC available, patch available.

Authentication Bypass Kanboard
NVD GitHub
CVE-2026-21880
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

Kanboard versions 1.2.48 and earlier contain an LDAP injection vulnerability where unsanitized user input in the LDAP authentication mechanism allows attackers to enumerate users, extract sensitive attributes, and target specific accounts. Public exploit code exists for this vulnerability. The issue is resolved in version 1.2.49 and later.

Ldap Kanboard
NVD GitHub
CVE-2026-21879
EPSS 0% CVSS 4.7
MEDIUM POC PATCH This Month

Open redirect vulnerability in Kanboard versions 1.2.48 and below allows attackers to bypass URL validation and redirect authenticated users to malicious websites through specially crafted URLs. Public exploit code exists for this vulnerability, which can be leveraged for phishing attacks and credential theft. The vulnerability is resolved in version 1.2.49.

Open Redirect Kanboard
NVD GitHub
CVE-2025-55011
EPSS 0% CVSS 6.4
MEDIUM POC PATCH This Month

Kanboard is project management software that focuses on the Kanban methodology. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Path Traversal Kanboard
NVD GitHub
CVE-2025-55010
EPSS 4% CVSS 9.1
CRITICAL POC PATCH Act Now

Kanboard is project management software that focuses on the Kanban methodology. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

PHP Deserialization RCE +1
NVD GitHub
CVE-2025-52576
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

A remote code execution vulnerability in Kanboard (CVSS 5.3). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Authentication Bypass Debian Kanboard
NVD GitHub
CVE-2025-52560
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

Kanboard prior to version 1.2.46 contains a host header injection vulnerability that allows unauthenticated attackers to craft malicious password reset emails with attacker-controlled URLs when the application_url configuration is unset (default state). If a victim clicks the poisoned reset link, their password reset token is leaked to the attacker's domain, enabling complete account takeover including administrative accounts. This vulnerability requires user interaction (clicking a link) but affects all users initiating password resets on vulnerable instances, making it a practical and high-impact attack vector for account compromise.

Information Disclosure Kanboard
NVD GitHub
CVE-2025-46825
EPSS 0% CVSS 1.3
LOW POC PATCH Monitor

Kanboard is project management software that focuses on the Kanban methodology. Rated low severity (CVSS 1.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

XSS Kanboard
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy