← Volver a CVEs
CVE-2026-21881
CRITICAL9.1
Descripcion
Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below is vulnerable to a critical authentication bypass when REVERSE_PROXY_AUTH is enabled. The application blindly trusts HTTP headers for user authentication without verifying the request originated from a trusted reverse proxy. An attacker can impersonate any user, including administrators, by simply sending a spoofed HTTP header. This issue is fixed in version 1.2.49.
Detalles CVE
Puntuacion CVSS v3.19.1
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado1/8/2026
Ultima modificacion1/20/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
kanboard:kanboard
Debilidades (CWE)
CWE-287
Referencias
https://github.com/kanboard/kanboard/commit/7af6143e2ad25b5c15549cca8af4341c7ac4e2fc(security-advisories@github.com)
https://github.com/kanboard/kanboard/releases/tag/v1.2.49(security-advisories@github.com)
https://github.com/kanboard/kanboard/security/advisories/GHSA-wwpf-3j4p-739w(security-advisories@github.com)
https://github.com/kanboard/kanboard/security/advisories/GHSA-wwpf-3j4p-739w(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.