Weak Password Recovery Mechanism for Forgotten Password Affecting kanboard package, versions <1.2.47+ds-1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Weak Password Recovery Mechanism for Forgotten Password vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-KANBOARD-12240203
  • published30 Aug 2025
  • disclosed24 Jun 2025

Introduced: 24 Jun 2025

CVE-2025-52560  (opens in a new tab)
CWE-640  (opens in a new tab)

How to fix?

Upgrade Debian:unstable kanboard to version 1.2.47+ds-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kanboard package and not the kanboard package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.46, Kanboard allows password reset emails to be sent with URLs derived from the unvalidated Host header when the application_url configuration is unset (default behavior). This allows an attacker to craft a malicious password reset link that leaks the token to an attacker-controlled domain. If a victim (including an administrator) clicks the poisoned link, their account can be taken over. This affects all users who initiate a password reset while application_url is not set. This issue has been patched in version 1.2.46.