Home

Description

Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49.

PUBLISHED Reserved 2026-01-05 | Published 2026-01-08 | Updated 2026-01-08 | Assigner GitHub_M




MEDIUM: 4.7CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N

Problem types

CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Product status

< 1.2.49
affected

References

github.com/...nboard/security/advisories/GHSA-mhv9-7m9w-7hcq exploit

github.com/...nboard/security/advisories/GHSA-mhv9-7m9w-7hcq

github.com/...ommit/93bcae03301a6d34185a8dba977417e6b3de519f

github.com/kanboard/kanboard/releases/tag/v1.2.49

cve.org (CVE-2026-21879)

nvd.nist.gov (CVE-2026-21879)

Download JSON