Duty Analyst: Salva Rocha

CVE-2026-21879

Published: 2026-01-08 02:15:53 | Last modified: 2026-01-20 18:15:11

MEDIUM CVSS 4.7
No EPSS data

Description

Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49.

CVSS details

Severity
medium
Score
4.7
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N

EPSS

This CVE is not currently listed in the EPSS dataset.

Show JSON
{
    "cve": {
        "id": "CVE-2026-21879",
        "cveTags": [],
        "metrics": {
            "cvssMetricV31": [
                {
                    "type": "Secondary",
                    "source": "security-advisories@github.com",
                    "cvssData": {
                        "scope": "CHANGED",
                        "version": "3.1",
                        "baseScore": 4.7,
                        "attackVector": "NETWORK",
                        "baseSeverity": "MEDIUM",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
                        "integrityImpact": "NONE",
                        "userInteraction": "REQUIRED",
                        "attackComplexity": "LOW",
                        "availabilityImpact": "NONE",
                        "privilegesRequired": "NONE",
                        "confidentialityImpact": "LOW"
                    },
                    "impactScore": 1.4,
                    "exploitabilityScore": 2.8
                },
                {
                    "type": "Primary",
                    "source": "nvd@nist.gov",
                    "cvssData": {
                        "scope": "CHANGED",
                        "version": "3.1",
                        "baseScore": 6.1,
                        "attackVector": "NETWORK",
                        "baseSeverity": "MEDIUM",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                        "integrityImpact": "LOW",
                        "userInteraction": "REQUIRED",
                        "attackComplexity": "LOW",
                        "availabilityImpact": "NONE",
                        "privilegesRequired": "NONE",
                        "confidentialityImpact": "LOW"
                    },
                    "impactScore": 2.7,
                    "exploitabilityScore": 2.8
                }
            ]
        },
        "published": "2026-01-08T02:15:53.490",
        "references": [
            {
                "url": "https://github.com/kanboard/kanboard/commit/93bcae03301a6d34185a8dba977417e6b3de519f",
                "tags": [
                    "Patch"
                ],
                "source": "security-advisories@github.com"
            },
            {
                "url": "https://github.com/kanboard/kanboard/releases/tag/v1.2.49",
                "tags": [
                    "Release Notes"
                ],
                "source": "security-advisories@github.com"
            },
            {
                "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq",
                "tags": [
                    "Exploit",
                    "Third Party Advisory"
                ],
                "source": "security-advisories@github.com"
            },
            {
                "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq",
                "tags": [
                    "Exploit",
                    "Third Party Advisory"
                ],
                "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
            }
        ],
        "vulnStatus": "Analyzed",
        "weaknesses": [
            {
                "type": "Secondary",
                "source": "security-advisories@github.com",
                "description": [
                    {
                        "lang": "en",
                        "value": "CWE-601"
                    }
                ]
            }
        ],
        "descriptions": [
            {
                "lang": "en",
                "value": "Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49."
            }
        ],
        "lastModified": "2026-01-20T18:15:10.597",
        "configurations": [
            {
                "nodes": [
                    {
                        "negate": false,
                        "cpeMatch": [
                            {
                                "criteria": "cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:*",
                                "vulnerable": true,
                                "matchCriteriaId": "AFA1D972-E76A-4A20-95F5-68D9915D3797",
                                "versionEndExcluding": "1.2.49"
                            }
                        ],
                        "operator": "OR"
                    }
                ]
            }
        ],
        "sourceIdentifier": "security-advisories@github.com"
    }
}