Source: kanboard
X-Debbugs-CC: [email protected]
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for kanboard.

CVE-2026-21879[0]:
| Kanboard is project management software focused on Kanban
| methodology. Versions 1.2.48 and below are vulnerable to an Open
| Redirect attack that allows malicious actors to redirect
| authenticated users to attacker-controlled websites. By crafting
| URLs such as //evil.com, attackers can bypass the filter_var($url,
| FILTER_VALIDATE_URL) validation check. This vulnerability could be
| exploited to conduct phishing attacks, steal user credentials, or
| distribute malware. The issue is fixed in version 1.2.49.

https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq
https://github.com/kanboard/kanboard/commit/93bcae03301a6d34185a8dba977417e6b3de519f
 (v1.2.49)

CVE-2026-21880[1]:
| Kanboard is project management software focused on Kanban
| methodology. Versions 1.2.48 and below have an LDAP Injection
| vulnerability in the LDAP authentication mechanism. User-supplied
| input is directly substituted into LDAP search filters without
| proper sanitization, allowing attackers to enumerate all LDAP users,
| discover sensitive user attributes, and perform targeted attacks
| against specific accounts. This issue is fixed in version 1.2.49.

https://github.com/kanboard/kanboard/security/advisories/GHSA-v66r-m28r-wmq7
https://github.com/kanboard/kanboard/commit/dd374079f7c2d1dab74c1680960e684ff8668586
 (v1.2.49)

CVE-2026-21881[2]:
| Kanboard is project management software focused on Kanban
| methodology. Versions 1.2.48 and below is vulnerable to a critical
| authentication bypass when REVERSE_PROXY_AUTH is enabled. The
| application blindly trusts HTTP headers for user authentication
| without verifying the request originated from a trusted reverse
| proxy. An attacker can impersonate any user, including
| administrators, by simply sending a spoofed HTTP header. This issue
| is fixed in version 1.2.49.

https://github.com/kanboard/kanboard/security/advisories/GHSA-wwpf-3j4p-739w
https://github.com/kanboard/kanboard/commit/7af6143e2ad25b5c15549cca8af4341c7ac4e2fc
 (v1.2.49)
 

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-21879
    https://www.cve.org/CVERecord?id=CVE-2026-21879
[1] https://security-tracker.debian.org/tracker/CVE-2026-21880
    https://www.cve.org/CVERecord?id=CVE-2026-21880
[2] https://security-tracker.debian.org/tracker/CVE-2026-21881
    https://www.cve.org/CVERecord?id=CVE-2026-21881

Please adjust the affected versions in the BTS as needed.

Reply via email to