CVE-2025-55010

CRITICAL LAB

Kanboard <1.2.47 - Remote Code Execution

Title source: llm

Description

Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.47, an unsafe deserialization vulnerability in the ProjectEventActvityFormatter allows admin users the ability to instantiate arbitrary php objects by modifying the event["data"] field in the project_activities table. A malicious actor can update this field to use a php gadget to write a web shell into the /plugins folder, which then gives remote code execution on the host system. This issue has been patched in version 1.2.47.

Exploits (1)

github WORKING POC
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2025-55010

Scores

CVSS v3 9.1
EPSS 0.0436
EPSS Percentile 89.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Lab Environment

EIP LAB Lab screenshot
patched docker pull ghcr.io/exploitintel/cve-2025-55010-patched:latest
vulnerable docker pull ghcr.io/exploitintel/cve-2025-55010-vulnerable:latest

Details

CWE
CWE-502
Status published
Products (1)
kanboard/kanboard < 1.2.47
Published Aug 12, 2025
Tracked Since Feb 18, 2026