Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32255: CWE-918: Server-Side Request Forgery (SSRF) in kanbn kan

0
High
VulnerabilityCVE-2026-32255cvecve-2026-32255cwe-918
Published: Wed Mar 18 2026 (03/18/2026, 23:11:36 UTC)
Source: CVE Database V5
Vendor/Project: kanbn
Product: kan

Description

CVE-2026-32255 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting kanbn's open-source project management tool, kan, in versions prior to 0. 5. 5. The vulnerability exists in the /api/download/attatchment endpoint, which lacks authentication and URL validation, allowing unauthenticated attackers to supply arbitrary URLs that the server fetches and returns. This can be exploited to access internal services, cloud metadata endpoints, or private network resources, potentially exposing sensitive information. No user interaction or authentication is required, and the vulnerability has a CVSS score of 8. 6. The issue is fixed in version 0. 5. 5, and as a mitigation, blocking or restricting access to the vulnerable endpoint at the reverse proxy level is recommended.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 01:10:45 UTC

Technical Analysis

CVE-2026-32255 is a Server-Side Request Forgery (SSRF) vulnerability identified in the kan project management tool, specifically in versions 0.5.4 and below. The vulnerability resides in the /api/download/attatchment endpoint, which accepts a user-supplied URL query parameter without any authentication or validation. The server uses the fetch() function to retrieve the content from the provided URL and returns the full response body to the requester. Because the endpoint is unauthenticated and does not validate URLs, an attacker can craft requests that cause the server to make HTTP requests to internal network resources, cloud provider metadata services (such as AWS, Azure, or GCP metadata endpoints), or other private services inaccessible externally. This can lead to unauthorized information disclosure, including sensitive internal data or credentials. The vulnerability has a CVSS 3.1 base score of 8.6, reflecting its high impact on confidentiality and the ease of exploitation without any privileges or user interaction. The scope is considered changed (S:C) because the attacker can leverage the server's trust and network position to access otherwise protected resources. The issue was fixed in version 0.5.5 by presumably adding authentication and/or URL validation. Until upgrading, it is advised to block or restrict access to the vulnerable endpoint at the reverse proxy level (e.g., nginx, Cloudflare) to prevent exploitation. No public exploits have been reported yet, but the vulnerability poses a significant risk due to its nature and ease of exploitation.

Potential Impact

The primary impact of this SSRF vulnerability is unauthorized access to internal network resources and cloud metadata services, which can lead to significant information disclosure. Attackers can retrieve sensitive data such as internal API endpoints, configuration files, or cloud instance credentials, potentially enabling further attacks like privilege escalation or lateral movement within the victim's environment. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely by any attacker with network access to the kan server. Organizations using affected versions of kan may face data breaches, exposure of confidential project management information, and compromise of cloud infrastructure credentials. The scope of impact is broad because many organizations use project management tools like kanbn, and the vulnerability affects all deployments running versions below 0.5.5. Additionally, the ability to access cloud metadata endpoints can lead to full cloud account compromise. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency of remediation given the vulnerability's severity and ease of exploitation.

Mitigation Recommendations

1. Upgrade kan to version 0.5.5 or later immediately, as this version contains the fix for the SSRF vulnerability. 2. Until the upgrade can be performed, implement strict access controls at the reverse proxy or firewall level to block or restrict access to the /api/download/attatchment endpoint. This can be done by IP whitelisting, authentication enforcement, or complete blocking if the endpoint is not required. 3. Employ network segmentation to limit the kan server's ability to reach sensitive internal services and cloud metadata endpoints, reducing the potential impact of SSRF exploitation. 4. Monitor server logs for unusual outbound requests originating from the kan server, especially to internal IP ranges or cloud metadata URLs, to detect potential exploitation attempts. 5. Review and harden cloud instance metadata service access policies, such as enabling metadata service version 2 (IMDSv2) on AWS, to mitigate SSRF risks. 6. Conduct a security audit of other endpoints in kan for similar SSRF or injection vulnerabilities. 7. Educate development teams on secure coding practices, including input validation and authentication enforcement on sensitive endpoints.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T15:05:48.396Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bb3516771bdb1749cf1e46

Added to database: 3/18/2026, 11:28:22 PM

Last enriched: 3/26/2026, 1:10:45 AM

Last updated: 5/1/2026, 8:00:09 PM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses