kanboard CVE Vulnerabilities & Metrics

Focus on kanboard vulnerabilities and metrics.

Last updated: 15 Feb 2026, 23:25 UTC

About kanboard Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with kanboard. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total kanboard CVEs: 43
Earliest CVE date: 03 Jul 2014, 14:55 UTC
Latest CVE date: 13 Feb 2026, 15:15 UTC

Latest CVE reference: CVE-2026-25531

Rolling Stats

30-day Count (Rolling): 4
365-day Count (Rolling): 12

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 33.33%
Year Variation (Calendar): 300.0%

Month Growth Rate (30-day Rolling): 33.33%
Year Growth Rate (365-day Rolling): 300.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical kanboard CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.07

Max CVSS: 6.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 22
4.0-6.9 22
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS kanboard CVEs

These are the five CVEs with the highest CVSS scores for kanboard, sorted by severity first and recency.

All CVEs for kanboard

CVE-2026-25531 kanboard vulnerability CVSS: 0 13 Feb 2026, 15:15 UTC

Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, The fix for CVE-2023-33968 is incomplete. The TaskCreationController::duplicateProjects() endpoint does not validate user permissions for target projects, allowing authenticated users to duplicate tasks into projects they cannot access. This vulnerability is fixed in 1.2.50.

CVE-2026-25924 kanboard vulnerability CVSS: 0 11 Feb 2026, 21:16 UTC

Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, a security control bypass vulnerability in Kanboard allows an authenticated administrator to achieve full Remote Code Execution (RCE). Although the application correctly hides the plugin installation interface when the PLUGIN_INSTALLER configuration is set to false, the underlying backend endpoint fails to verify this security setting. An attacker can exploit this oversight to force the server to download and install a malicious plugin, leading to arbitrary code execution. This vulnerability is fixed in 1.2.50.

CVE-2026-25530 kanboard vulnerability CVSS: 0 10 Feb 2026, 17:16 UTC

Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, the getSwimlane API method lacks project-level authorization, allowing authenticated users to access swimlane data from projects they cannot access. This vulnerability is fixed in 1.2.50.

CVE-2026-24885 kanboard vulnerability CVSS: 0 10 Feb 2026, 17:16 UTC

Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, a Cross-Site Request Forgery (CSRF) vulnerability exists in the ProjectPermissionController within the Kanboard application. The application fails to strictly enforce the application/json Content-Type for the changeUserRole action. Although the request body is JSON, the server accepts text/plain, allowing an attacker to craft a malicious form using the text/plain attribute. Which allows unauthorized modification of project user roles if an authenticated admin visits a malicious site This vulnerability is fixed in 1.2.50.

CVE-2026-21881 kanboard vulnerability CVSS: 0 08 Jan 2026, 02:15 UTC

Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below is vulnerable to a critical authentication bypass when REVERSE_PROXY_AUTH is enabled. The application blindly trusts HTTP headers for user authentication without verifying the request originated from a trusted reverse proxy. An attacker can impersonate any user, including administrators, by simply sending a spoofed HTTP header. This issue is fixed in version 1.2.49.

CVE-2026-21880 kanboard vulnerability CVSS: 0 08 Jan 2026, 02:15 UTC

Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below have an LDAP Injection vulnerability in the LDAP authentication mechanism. User-supplied input is directly substituted into LDAP search filters without proper sanitization, allowing attackers to enumerate all LDAP users, discover sensitive user attributes, and perform targeted attacks against specific accounts. This issue is fixed in version 1.2.49.

CVE-2026-21879 kanboard vulnerability CVSS: 0 08 Jan 2026, 02:15 UTC

Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49.

CVE-2025-55011 kanboard vulnerability CVSS: 0 12 Aug 2025, 16:15 UTC

Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.47, the createTaskFile method in the API does not validate whether the task_id parameter is a valid task id, nor does it check for path traversal. As a result, a malicious actor could write a file anywhere on the system the app user controls. The impact is limited due to the filename being hashed and having no extension. This issue has been patched in version 1.2.47.

CVE-2025-55010 kanboard vulnerability CVSS: 0 12 Aug 2025, 16:15 UTC

Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.47, an unsafe deserialization vulnerability in the ProjectEventActvityFormatter allows admin users the ability to instantiate arbitrary php objects by modifying the event["data"] field in the project_activities table. A malicious actor can update this field to use a php gadget to write a web shell into the /plugins folder, which then gives remote code execution on the host system. This issue has been patched in version 1.2.47.

CVE-2025-52576 kanboard vulnerability CVSS: 0 25 Jun 2025, 17:15 UTC

Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.46, Kanboard is vulnerable to username enumeration and IP spoofing-based brute-force protection bypass. By analyzing login behavior and abusing trusted HTTP headers, an attacker can determine valid usernames and circumvent rate-limiting or blocking mechanisms. Any organization running a publicly accessible Kanboard instance is affected, especially if relying on IP-based protections like Fail2Ban or CAPTCHA for login rate-limiting. Attackers with access to the login page can exploit this flaw to enumerate valid usernames and bypass IP-based blocking mechanisms, putting all user accounts at higher risk of brute-force or credential stuffing attacks. Version 1.2.46 contains a patch for the issue.

CVE-2025-52560 kanboard vulnerability CVSS: 0 24 Jun 2025, 03:15 UTC

Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.46, Kanboard allows password reset emails to be sent with URLs derived from the unvalidated Host header when the application_url configuration is unset (default behavior). This allows an attacker to craft a malicious password reset link that leaks the token to an attacker-controlled domain. If a victim (including an administrator) clicks the poisoned link, their account can be taken over. This affects all users who initiate a password reset while application_url is not set. This issue has been patched in version 1.2.46.

CVE-2025-46825 kanboard vulnerability CVSS: 0 12 May 2025, 23:15 UTC

Kanboard is project management software that focuses on the Kanban methodology. Versions 1.2.26 through 1.2.44 have a Stored Cross-Site Scripting (XSS) Vulnerability in the `name` parameter of the `http://localhost/?controller=ProjectCreationController&action=create` form. This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users. Note that the default content security policy (CSP) blocks the JavaScript attack, though it can be exploited if an instance is badly configured and the software is vulnerable to CSS injection because of the unsafe-inline on the default CSP. Version 1.2.45 contains a fix for the issue.

CVE-2024-55603 kanboard vulnerability CVSS: 0 19 Dec 2024, 00:15 UTC

Kanboard is project management software that focuses on the Kanban methodology. In affected versions sessions are still usable even though their lifetime has exceeded. Kanboard implements a cutom session handler (`app/Core/Session/SessionHandler.php`), to store the session data in a database. Therefore, when a `session_id` is given, kanboard queries the data from the `sessions` sql table. At this point, it does not correctly verify, if a given `session_id` has already exceeded its lifetime (`expires_at`). Thus, a session which's lifetime is already `> time()`, is still queried from the database and hence a valid login. The implemented **SessionHandlerInterface::gc** function, that does remove invalid sessions, is called only **with a certain probability** (_Cleans up expired sessions. Called by `session_start()`, based on `session.gc_divisor`, `session.gc_probability` and `session.gc_maxlifetime` settings_) accordingly to the php documentation. In the official Kanboard docker image these values default to: session.gc_probability=1, session.gc_divisor=1000. Thus, an expired session is only terminated with probability 1/1000. This issue has been addressed in release 1.2.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-54001 kanboard vulnerability CVSS: 0 05 Dec 2024, 16:15 UTC

Kanboard is project management software that focuses on the Kanban methodology. HTML can be injected and stored into the application settings section. The fields application_language, application_date_format,application_timezone and application_time_format allow arbirary user input which is reflected. The vulnerability can become xss if the user input is javascript code that bypass CSP. This vulnerability is fixed in 1.2.41.

CVE-2024-36399 kanboard vulnerability CVSS: 0 06 Jun 2024, 16:15 UTC

Kanboard is project management software that focuses on the Kanban methodology. The vuln is in app/Controller/ProjectPermissionController.php function addUser(). The users permission to add users to a project only get checked on the URL parameter project_id. If the user is authorized to add users to this project the request gets processed. The users permission for the POST BODY parameter project_id does not get checked again while processing. An attacker with the 'Project Manager' on a single project may take over any other project. The vulnerability is fixed in 1.2.37.

CVE-2024-22720 kanboard vulnerability CVSS: 0 24 Jan 2024, 18:15 UTC

Kanboard 1.2.34 is vulnerable to Html Injection in the group management feature.

CVE-2023-36813 kanboard vulnerability CVSS: 0 05 Jul 2023, 22:15 UTC

Kanboard is project management software that focuses on the Kanban methodology. In versions prior to 1.2.31authenticated user is able to perform a SQL Injection, leading to a privilege escalation or loss of confidentiality. It appears that in some insert and update operations, the code improperly uses the PicoDB library to update/insert new information. Version 1.2.31 contains a fix for this issue.

CVE-2023-33970 kanboard vulnerability CVSS: 0 05 Jun 2023, 20:15 UTC

Kanboard is open source project management software that focuses on the Kanban methodology. A vulnerability related to a `missing access control` was found, which allows a User with the lowest privileges to leak all the tasks and projects titles within the software, even if they are not invited or it's a personal project. This could also lead to private/critical information being leaked if such information is in the title. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-33969 kanboard vulnerability CVSS: 0 05 Jun 2023, 20:15 UTC

Kanboard is open source project management software that focuses on the Kanban methodology. A stored Cross site scripting (XSS) allows an attacker to execute arbitrary Javascript and any user who views the task containing the malicious code will be exposed to the XSS attack. Note: The default CSP header configuration blocks this javascript attack. This issue has been addressed in version 1.2.30. Users are advised to upgrade. Users unable to upgrade should ensure that they have a restrictive CSP header config.

CVE-2023-33968 kanboard vulnerability CVSS: 0 05 Jun 2023, 20:15 UTC

Kanboard is open source project management software that focuses on the Kanban methodology. Versions prior to 1.2.30 are subject to a missing access control vulnerability that allows a user with low privileges to create or transfer tasks to any project within the software, even if they have not been invited or the project is personal. The vulnerable features are `Duplicate to project` and `Move to project`, which both utilize the `checkDestinationProjectValues()` function to check his values. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-33956 kanboard vulnerability CVSS: 0 05 Jun 2023, 20:15 UTC

Kanboard is open source project management software that focuses on the Kanban methodology. Versions prior to 1.2.30 are subject to an Insecure direct object reference (IDOR) vulnerability present in the application's URL parameter. This vulnerability enables any user to read files uploaded by any other user, regardless of their privileges or restrictions. By Changing the file_id any user can render all the files where MimeType is image uploaded under **/files** directory regard less of uploaded by any user. This vulnerability poses a significant impact and severity to the application's security. By manipulating the URL parameter, an attacker can access sensitive files that should only be available to authorized users. This includes confidential documents or any other type of file stored within the application. The ability to read these files can lead to various detrimental consequences, such as unauthorized disclosure of sensitive information, privacy breaches, intellectual property theft, or exposure of trade secrets. Additionally, it could result in legal and regulatory implications, reputation damage, financial losses, and potential compromise of user trust. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-32685 kanboard vulnerability CVSS: 0 30 May 2023, 05:15 UTC

Kanboard is project management software that focuses on the Kanban methodology. Due to improper handling of elements under the `contentEditable` element, maliciously crafted clipboard content can inject arbitrary HTML tags into the DOM. A low-privileged attacker with permission to attach a document on a vulnerable Kanboard instance can trick the victim into pasting malicious screenshot data and achieve cross-site scripting if CSP is improperly configured. This issue has been patched in version 1.2.29.

CVE-2019-7324 kanboard vulnerability CVSS: 4.3 04 Feb 2019, 19:29 UTC

app/Core/Paginator.php in Kanboard before 1.2.8 has XSS in pagination sorting.

CVE-2017-15212 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can at least see the names of tags of a private project of another user.

CVE-2017-15211 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can add an external link to a private project of another user.

CVE-2017-15210 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can see thumbnails of pictures from a private project of another user.

CVE-2017-15209 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can remove attachments from a private project of another user.

CVE-2017-15208 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can remove automatic actions from a private project of another user.

CVE-2017-15207 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tasks of a private project of another user.

CVE-2017-15206 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can add an internal link to a private project of another user.

CVE-2017-15205 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can download attachments from a private project of another user.

CVE-2017-15204 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can add automatic actions to a private project of another user.

CVE-2017-15203 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can remove categories from a private project of another user.

CVE-2017-15202 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can edit columns of a private project of another user.

CVE-2017-15201 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tags of a private project of another user.

CVE-2017-15200 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can add a new task to a private project of another user.

CVE-2017-15199 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can edit metadata of a private project of another user, as demonstrated by Name, Email, Identifier, and Description.

CVE-2017-15198 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can edit a category of a private project of another user.

CVE-2017-15197 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can add a new category to a private project of another user.

CVE-2017-15196 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can remove columns from a private project of another user.

CVE-2017-15195 kanboard vulnerability CVSS: 4.0 11 Oct 2017, 01:32 UTC

In Kanboard before 1.0.47, by altering form data, an authenticated user can edit swimlanes of a private project of another user.

CVE-2017-12851 kanboard vulnerability CVSS: 4.0 14 Aug 2017, 20:29 UTC

An authenticated standard user could reset the password of the admin by altering form data. Affects kanboard before 1.0.46.

CVE-2017-12850 kanboard vulnerability CVSS: 4.0 14 Aug 2017, 20:29 UTC

An authenticated standard user could reset the password of other users (including the admin) by altering form data. Affects kanboard before 1.0.46.

CVE-2014-3920 kanboard vulnerability CVSS: 6.8 03 Jul 2014, 14:55 UTC

Cross-site request forgery (CSRF) vulnerability in Kanboard before 1.0.6 allows remote attackers to hijack the authentication of administrators for requests that add an administrative user via a save action to the default URI.