Package: kanboard
X-Debbugs-CC: [email protected]
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for kanboard.

CVE-2026-33058[0]:
| Kanboard is project management software focused on Kanban
| methodology. Versions prior to 1.2.51 have an authenticated SQL
| injection vulnerability. Attackers with the permission to add users
| to a project can leverage this vulnerability to dump the entirety of
| the kanboard database. Version 1.2.51 fixes the issue.

https://github.com/kanboard/kanboard/security/advisories/GHSA-f62r-m4mr-2xhh

CVE-2026-29056[1]:
| Kanboard is project management software focused on Kanban
| methodology. Prior to 1.2.51, Kanboard's user invite registration
| endpoint (`UserInviteController::register()`) accepts all POST
| parameters and passes them to `UserModel::create()` without
| filtering out the `role` field. An attacker who receives an invite
| link can inject `role=app-admin` in the registration form to create
| an administrator account. Version 1.2.51 fixes the issue.

https://github.com/kanboard/kanboard/security/advisories/GHSA-2jvj-q44v-6p3x
 

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-33058
    https://www.cve.org/CVERecord?id=CVE-2026-33058
[1] https://security-tracker.debian.org/tracker/CVE-2026-29056
    https://www.cve.org/CVERecord?id=CVE-2026-29056

Please adjust the affected versions in the BTS as needed.

Reply via email to