Cross-site Scripting (XSS) Affecting kanboard package, versions <1.2.47+ds-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-KANBOARD-12240204
  • published30 Aug 2025
  • disclosed12 May 2025

Introduced: 12 May 2025

CVE-2025-46825  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade Debian:unstable kanboard to version 1.2.47+ds-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kanboard package and not the kanboard package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Kanboard is project management software that focuses on the Kanban methodology. Versions 1.2.26 through 1.2.44 have a Stored Cross-Site Scripting (XSS) Vulnerability in the name parameter of the http://localhost/?controller=ProjectCreationController&amp;action=create form. This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users. Note that the default content security policy (CSP) blocks the JavaScript attack, though it can be exploited if an instance is badly configured and the software is vulnerable to CSS injection because of the unsafe-inline on the default CSP. Version 1.2.45 contains a fix for the issue.

CVSS Base Scores

version 3.1