CVE-2025-55011 – Kanboard File Traversal Vulnerability

The following table lists the changes that have been made to the
CVE-2025-55011 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 12, 2025

    Action Type Old Value New Value
    Added Description Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.47, the createTaskFile method in the API does not validate whether the task_id parameter is a valid task id, nor does it check for path traversal. As a result, a malicious actor could write a file anywhere on the system the app user controls. The impact is limited due to the filename being hashed and having no extension. This issue has been patched in version 1.2.47.
    Added CVSS V3.1 AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
    Added CWE CWE-22
    Added Reference https://github.com/kanboard/kanboard/blob/b2e35ac520add67cff792aab960b3c002c48e3d0/app/Api/Procedure/TaskFileProcedure.php#L47-L57
    Added Reference https://github.com/kanboard/kanboard/commit/523a6135e944b6884c091a3fd7605af8ef133681
    Added Reference https://github.com/kanboard/kanboard/security/advisories/GHSA-26f4-rx96-xc55
Share the Post:

Related Posts