← Retour aux CVEs
CVE-2026-21879
MEDIUM4.7
Description
Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49.
Details CVE
Score CVSS v3.14.7
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie1/8/2026
Derniere modification1/20/2026
Sourcenvd
Observations honeypot0
Produits affectes
kanboard:kanboard
Faiblesses (CWE)
CWE-601
References
https://github.com/kanboard/kanboard/commit/93bcae03301a6d34185a8dba977417e6b3de519f(security-advisories@github.com)
https://github.com/kanboard/kanboard/releases/tag/v1.2.49(security-advisories@github.com)
https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq(security-advisories@github.com)
https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.