Password Reset Vulnerability in Kanboard Project Management Software
CVE-2025-52560
8.1HIGH
What is CVE-2025-52560?
A vulnerability in Kanboard's handling of password reset emails allows an attacker to exploit unvalidated Host headers. If the application_url configuration is not set, attackers can craft malicious password reset links that lead to their own domain. When a victim clicks the link, it compromises their account by leaking the reset token. This issue affects all users initiating a password reset, including administrators. The vulnerability has been remediated in version 1.2.46.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
kanboard < 1.2.46
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
