FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

kanboard -- Password Reset Poisoning via Host Header Injection

Affected packages
kanboard < 1.2.45

Details

VuXML ID e26608ff-5266-11f0-b522-b42e991fc52e
Discovery 2025-06-26
Entry 2025-06-26

GitHub Security Advisories reports:

Kanboard allows password reset emails to be sent with URLs derived from the unvalidated Host header when the application_url configuration is unset (default behavior). This allows an attacker to craft a malicious password reset link that leaks the token to an attacker-controlled domain. If a victim (including an administrator) clicks the poisoned link, their account can be taken over. This affects all users who initiate a password reset while application_url is not set.

References

CVE Name CVE-2025-52560
URL https://nvd.nist.gov/vuln/detail/CVE-2025-52560