Impact
Kanboard’s LDAP authentication in versions 1.2.48 and earlier accepts unsanitized user input directly in LDAP search filters, enabling an attacker to execute LDAP injection. This flaw permits enumeration of all LDAP users and the retrieval of sensitive attributes, exposing confidential information and facilitating targeted attacks against specific accounts. The weakness maps to CWE-90 (LDAP injection) and CWE-200 (information exposure).
Affected Systems
The vulnerability affects Kanboard project management software from the kanboard vendor, specifically versions 1.2.48 and all lower releases. The issue is resolved in version 1.2.49 and later.
Risk and Exploitability
With a CVSS score of 5.3 and an EPSS lower than 1%, the exploit likelihood is modest, and the flaw is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires the attacker to reach the LDAP authentication endpoint and supply crafted input; it does not necessitate elevated privileges or remote code execution. Thus, the risk is moderate, primarily impacting confidentiality by revealing user data.
OpenCVE Enrichment