Description
Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below is vulnerable to a critical authentication bypass when REVERSE_PROXY_AUTH is enabled. The application blindly trusts HTTP headers for user authentication without verifying the request originated from a trusted reverse proxy. An attacker can impersonate any user, including administrators, by simply sending a spoofed HTTP header. This issue is fixed in version 1.2.49.
Published: 2026-01-08
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Impersonation via authentication bypass
Action: Apply patch
AI Analysis

Impact

Kanboard project management software versions 1.2.48 and earlier are impacted by an authentication bypass that occurs when REVERSE_PROXY_AUTH is enabled. The application blindly accepts HTTP headers for authentication without verifying the request originates from a trusted reverse proxy. An attacker who can send HTTP requests to the server is able to spoof the authentication header and impersonate any user, including administrators, thereby gaining unauthorized access to the system.

Affected Systems

The vulnerability affects Kanboard software by the vendor kanboard. All installations using versions 1.2.48 or lower are vulnerable; the issue has been fixed starting with version 1.2.49.

Risk and Exploitability

The flaw carries a CVSS score of 9.1, indicating critical severity. The EPSS score is less than 1%, suggesting a low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by sending a malicious HTTP request with forged authentication headers to a Kanboard instance that has REVERSE_PROXY_AUTH enabled and that accepts the headers as valid. The likely attack vector is an externally reachable server where the attacker can control request headers; no additional local privilege is required. The impact is direct impersonation of any user and elevation of privileges to administrator level.

Generated by OpenCVE AI on April 18, 2026 at 07:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Kanboard to version 1.2.49 or later
  • If upgrading immediately is not possible, disable the REVERSE_PROXY_AUTH configuration until the patch is applied
  • Configure the reverse proxy to validate or strip authentication headers and prevent arbitrary header injection

Generated by OpenCVE AI on April 18, 2026 at 07:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:*

Thu, 08 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Kanboard
Kanboard kanboard
Vendors & Products Kanboard
Kanboard kanboard

Thu, 08 Jan 2026 01:30:00 +0000

Type Values Removed Values Added
Description Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below is vulnerable to a critical authentication bypass when REVERSE_PROXY_AUTH is enabled. The application blindly trusts HTTP headers for user authentication without verifying the request originated from a trusted reverse proxy. An attacker can impersonate any user, including administrators, by simply sending a spoofed HTTP header. This issue is fixed in version 1.2.49.
Title Kanboard is Vulnerable to Reverse Proxy Authentication Bypass
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Kanboard Kanboard
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-08T17:13:05.216Z

Reserved: 2026-01-05T17:24:36.928Z

Link: CVE-2026-21881

cve-icon Vulnrichment

Updated: 2026-01-08T17:12:55.062Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-08T02:15:53.803

Modified: 2026-01-20T15:57:22.667

Link: CVE-2026-21881

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:00:05Z

Weaknesses