CVE-2026-21879

NameCVE-2026-21879
DescriptionKanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1125061

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kanboard (PTS)forky1.2.48+ds-1vulnerable
sid1.2.49+ds-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kanboardsource(unstable)1.2.49+ds-11125061

Notes

https://github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcq
https://github.com/kanboard/kanboard/commit/93bcae03301a6d34185a8dba977417e6b3de519f (v1.2.49)

Search for package or bug name: Reporting problems