Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.47, an unsafe deserialization vulnerability in the ProjectEventActvityFormatter allows admin users the ability to instantiate arbitrary php objects by modifying the event["data"] field in the project_activities table. A malicious actor can update this field to use a php gadget to write a web shell into the /plugins folder, which then gives remote code execution on the host system. This issue has been patched in version 1.2.47.
References
Configurations
No configuration.
History
13 Aug 2025, 17:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
12 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/kanboard/kanboard/security/advisories/GHSA-359x-c69j-q64r - |
12 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-12 16:15
Updated : 2025-08-13 17:34
NVD link : CVE-2025-55010
Mitre link : CVE-2025-55010
CVE.ORG link : CVE-2025-55010
JSON object : View
Products Affected
No product.
CWE
CWE-502
Deserialization of Untrusted Data