Deserialization of Untrusted Data Affecting kanboard package, versions <1.2.47+ds-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.64% (70th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Deserialization of Untrusted Data vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-KANBOARD-12240206
  • published30 Aug 2025
  • disclosed12 Aug 2025

Introduced: 12 Aug 2025

NewCVE-2025-55010  (opens in a new tab)
CWE-502  (opens in a new tab)

How to fix?

Upgrade Debian:unstable kanboard to version 1.2.47+ds-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kanboard package and not the kanboard package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.47, an unsafe deserialization vulnerability in the ProjectEventActvityFormatter allows admin users the ability to instantiate arbitrary php objects by modifying the event["data"] field in the project_activities table. A malicious actor can update this field to use a php gadget to write a web shell into the /plugins folder, which then gives remote code execution on the host system. This issue has been patched in version 1.2.47.

CVSS Base Scores

version 3.1