Unrated severityOSV Advisory· Published Jan 8, 2026· Updated Jan 8, 2026
Kanboard vulnerable to Open Redirect via protocol-relative URLs
CVE-2026-21879
Description
Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/kanboard/kanboard/commit/93bcae03301a6d34185a8dba977417e6b3de519fmitrex_refsource_MISC
- github.com/kanboard/kanboard/releases/tag/v1.2.49mitrex_refsource_MISC
- github.com/kanboard/kanboard/security/advisories/GHSA-mhv9-7m9w-7hcqmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.