CVE-2026-21879

Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:*

History

20 Jan 2026, 18:15

Type Values Removed Values Added
References () https://github.com/kanboard/kanboard/commit/93bcae03301a6d34185a8dba977417e6b3de519f - () https://github.com/kanboard/kanboard/commit/93bcae03301a6d34185a8dba977417e6b3de519f - Patch
References () https://github.com/kanboard/kanboard/releases/tag/v1.2.49 - () https://github.com/kanboard/kanboard/releases/tag/v1.2.49 - Release Notes
References () https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq - () https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq - Exploit, Third Party Advisory
CPE cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:*
First Time Kanboard
Kanboard kanboard

08 Jan 2026, 19:15

Type Values Removed Values Added
References () https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq - () https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq -

08 Jan 2026, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-08 02:15

Updated : 2026-01-20 18:15


NVD link : CVE-2026-21879

Mitre link : CVE-2026-21879

CVE.ORG link : CVE-2026-21879


JSON object : View

Products Affected

kanboard

  • kanboard
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')