Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 08 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kanboard
Kanboard kanboard |
|
| Vendors & Products |
Kanboard
Kanboard kanboard |
Thu, 08 Jan 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49. | |
| Title | Kanboard vulnerable to Open Redirect via protocol-relative URLs | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-08T18:34:42.665Z
Reserved: 2026-01-05T17:24:36.928Z
Link: CVE-2026-21879
Updated: 2026-01-08T18:34:24.332Z
Status : Undergoing Analysis
Published: 2026-01-08T02:15:53.490
Modified: 2026-01-08T19:15:59.267
Link: CVE-2026-21879
No data.
OpenCVE Enrichment
Updated: 2026-01-08T09:47:43Z