We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-55010

Kanboard Authenticated Admin Remote Code Execution via Unsafe Deserialization of Events



Description

Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.47, an unsafe deserialization vulnerability in the ProjectEventActvityFormatter allows admin users the ability to instantiate arbitrary php objects by modifying the event["data"] field in the project_activities table. A malicious actor can update this field to use a php gadget to write a web shell into the /plugins folder, which then gives remote code execution on the host system. This issue has been patched in version 1.2.47.

Reserved 2025-08-04 | Published 2025-08-12 | Updated 2025-08-12 | Assigner GitHub_M


CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-502: Deserialization of Untrusted Data

Product status

< 1.2.47
affected

References

github.com/...nboard/security/advisories/GHSA-359x-c69j-q64r

github.com/...ommit/7148ac092e5db6b33e0fc35e04bca328d96c1f6f

github.com/...pp/Formatter/ProjectActivityEventFormatter.php

cve.org (CVE-2025-55010)

nvd.nist.gov (CVE-2025-55010)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-55010

Support options

Helpdesk Chat, Email, Knowledgebase