DEBIAN-CVE-2025-52576

Source
https://security-tracker.debian.org/tracker/CVE-2025-52576
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-52576.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-52576
Upstream
Published
2025-06-25T17:15:39.023Z
Modified
2025-11-20T10:18:24.004865Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.46, Kanboard is vulnerable to username enumeration and IP spoofing-based brute-force protection bypass. By analyzing login behavior and abusing trusted HTTP headers, an attacker can determine valid usernames and circumvent rate-limiting or blocking mechanisms. Any organization running a publicly accessible Kanboard instance is affected, especially if relying on IP-based protections like Fail2Ban or CAPTCHA for login rate-limiting. Attackers with access to the login page can exploit this flaw to enumerate valid usernames and bypass IP-based blocking mechanisms, putting all user accounts at higher risk of brute-force or credential stuffing attacks. Version 1.2.46 contains a patch for the issue.

References

Affected packages

Debian:14 / kanboard

Package

Name
kanboard
Purl
pkg:deb/debian/kanboard?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.47+ds-1

Affected versions

1.*

1.2.22+ds-1
1.2.23+ds-1
1.2.23+ds-1.1
1.2.25+ds-1
1.2.25+ds-2
1.2.25+ds-3
1.2.26+ds-1
1.2.26+ds-2
1.2.26+ds-3
1.2.26+ds-4
1.2.30+ds-1
1.2.31+ds-1
1.2.31+ds2-1
1.2.44+ds-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-52576.json"