VYPR
Unrated severityOSV Advisory· Published Jan 8, 2026· Updated Jan 8, 2026

Kanboard vulnerable to Open Redirect via protocol-relative URLs

CVE-2026-21879

Description

Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49.

Affected products

2
  • Kanboard/KanboardOSV2 versions
    v1.0.0, v1.0.1, v1.0.10, …+ 1 more
    • (no CPE)range: v1.0.0, v1.0.1, v1.0.10, …
    • (no CPE)range: <=1.2.48

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.