Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 18 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 18 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kanboard
Kanboard kanboard |
|
| Vendors & Products |
Kanboard
Kanboard kanboard |
Wed, 18 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kanboard is project management software focused on Kanban methodology. Prior to 1.2.51, Kanboard's user invite registration endpoint (`UserInviteController::register()`) accepts all POST parameters and passes them to `UserModel::create()` without filtering out the `role` field. An attacker who receives an invite link can inject `role=app-admin` in the registration form to create an administrator account. Version 1.2.51 fixes the issue. | |
| Title | Kanboard's privilege escalation via mass assignment in user invite registration allows any invited user to become admin | |
| Weaknesses | CWE-915 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-18T14:01:17.860Z
Reserved: 2026-03-03T17:50:11.244Z
Link: CVE-2026-29056
Updated: 2026-03-18T14:01:06.511Z
Status : Analyzed
Published: 2026-03-18T02:16:24.407
Modified: 2026-03-18T19:40:48.907
Link: CVE-2026-29056
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:59:33Z