Description
Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49.
INFO
Published Date :
2026-01-08T00:51:50.954Z
Last Modified :
2026-01-08T18:34:42.665Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-21879 vulnerability.
| Vendors | Products |
|---|---|
| Kanboard |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-21879.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact