CVE-2025-55010

Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.47, an unsafe deserialization vulnerability in the ProjectEventActvityFormatter allows admin users the ability to instantiate arbitrary php objects by modifying the event["data"] field in the project_activities table. A malicious actor can update this field to use a php gadget to write a web shell into the /plugins folder, which then gives remote code execution on the host system. This issue has been patched in version 1.2.47.
Configurations

No configuration.

History

13 Aug 2025, 17:34

Type Values Removed Values Added
Summary
  • (es) Kanboard es un software de gestión de proyectos basado en la metodología Kanban. Antes de la versión 1.2.47, una vulnerabilidad de deserialización insegura en ProjectEventActvityFormatter permitía a los administradores instanciar objetos PHP arbitrarios modificando el campo event["data"] en la tabla project_activities. Un atacante puede actualizar este campo para usar un gadget PHP y escribir un shell web en la carpeta /plugins, lo que permite la ejecución remota de código en el sistema host. Este problema se ha corregido en la versión 1.2.47.

12 Aug 2025, 17:15

Type Values Removed Values Added
References () https://github.com/kanboard/kanboard/security/advisories/GHSA-359x-c69j-q64r - () https://github.com/kanboard/kanboard/security/advisories/GHSA-359x-c69j-q64r -

12 Aug 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-12 16:15

Updated : 2025-08-13 17:34


NVD link : CVE-2025-55010

Mitre link : CVE-2025-55010

CVE.ORG link : CVE-2025-55010


JSON object : View

Products Affected

No product.

CWE
CWE-502

Deserialization of Untrusted Data