Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49.
References
| Link | Resource |
|---|---|
| https://github.com/kanboard/kanboard/commit/93bcae03301a6d34185a8dba977417e6b3de519f | Patch |
| https://github.com/kanboard/kanboard/releases/tag/v1.2.49 | Release Notes |
| https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq | Exploit Third Party Advisory |
| https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq | Exploit Third Party Advisory |
Configurations
History
20 Jan 2026, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/kanboard/kanboard/commit/93bcae03301a6d34185a8dba977417e6b3de519f - Patch | |
| References | () https://github.com/kanboard/kanboard/releases/tag/v1.2.49 - Release Notes | |
| References | () https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:* | |
| First Time |
Kanboard
Kanboard kanboard |
08 Jan 2026, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq - |
08 Jan 2026, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-08 02:15
Updated : 2026-01-20 18:15
NVD link : CVE-2026-21879
Mitre link : CVE-2026-21879
CVE.ORG link : CVE-2026-21879
JSON object : View
Products Affected
kanboard
- kanboard
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
