Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-21879

Опубликовано: 08 янв. 2026
Источник: debian
EPSS Низкий

Описание

Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kanboardfixed1.2.49+ds-1package

Примечания

  • https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq

  • https://github.com/kanboard/kanboard/commit/93bcae03301a6d34185a8dba977417e6b3de519f (v1.2.49)

EPSS

Процентиль: 8%
0.00029
Низкий

Связанные уязвимости

CVSS3: 4.7
nvd
около 1 месяца назад

Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49.

EPSS

Процентиль: 8%
0.00029
Низкий