Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.47, an unsafe deserialization vulnerability in the ProjectEventActvityFormatter allows admin users the ability to instantiate arbitrary php objects by modifying the event["data"] field in the project_activities table. A malicious actor can update this field to use a php gadget to write a web shell into the /plugins folder, which then gives remote code execution on the host system. This issue has been patched in version 1.2.47.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Aug 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Kanboard
Kanboard kanboard |
|
Vendors & Products |
Kanboard
Kanboard kanboard |
Tue, 12 Aug 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 12 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.47, an unsafe deserialization vulnerability in the ProjectEventActvityFormatter allows admin users the ability to instantiate arbitrary php objects by modifying the event["data"] field in the project_activities table. A malicious actor can update this field to use a php gadget to write a web shell into the /plugins folder, which then gives remote code execution on the host system. This issue has been patched in version 1.2.47. | |
Title | Kanboard Authenticated Admin Remote Code Execution via Unsafe Deserialization of Events | |
Weaknesses | CWE-502 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-12T15:57:13.343Z
Updated: 2025-08-12T16:24:36.343Z
Reserved: 2025-08-04T17:34:24.422Z
Link: CVE-2025-55010

Updated: 2025-08-12T16:12:29.061Z

Status : Awaiting Analysis
Published: 2025-08-12T16:15:28.540
Modified: 2025-08-13T17:34:12.350
Link: CVE-2025-55010

No data.