Untriaged
Permalink
CVE-2026-25924
8.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Activity log
- Created suggestion
Kanboard is Missing Access Control on Plugin Installation leading to Administrative RCE
Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, a security control bypass vulnerability in Kanboard allows an authenticated administrator to achieve full Remote Code Execution (RCE). Although the application correctly hides the plugin installation interface when the PLUGIN_INSTALLER configuration is set to false, the underlying backend endpoint fails to verify this security setting. An attacker can exploit this oversight to force the server to download and install a malicious plugin, leading to arbitrary code execution. This vulnerability is fixed in 1.2.50.
References
-
https://github.com/kanboard/kanboard/security/advisories/GHSA-grch-p7vf-vc4f x_refsource_CONFIRM
-
https://github.com/kanboard/kanboard/releases/tag/v1.2.50 x_refsource_MISC
Affected products
kanboard
- ==< 1.2.50
Package maintainers
-
@yzx9 Zexin Yuan <yuan.zx@outlook.com>