Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 20 Jan 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:* |
Thu, 08 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kanboard
Kanboard kanboard |
|
| Vendors & Products |
Kanboard
Kanboard kanboard |
Thu, 08 Jan 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49. | |
| Title | Kanboard vulnerable to Open Redirect via protocol-relative URLs | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-08T18:34:42.665Z
Reserved: 2026-01-05T17:24:36.928Z
Link: CVE-2026-21879
Updated: 2026-01-08T18:34:24.332Z
Status : Analyzed
Published: 2026-01-08T02:15:53.490
Modified: 2026-01-20T18:15:10.597
Link: CVE-2026-21879
No data.
OpenCVE Enrichment
Updated: 2026-04-18T17:00:05Z