{"id":"CVE-2023-36813","summary":"Kanboard Authenticated SQL Injections vulnerability","details":"Kanboard is project management software that focuses on the Kanban methodology. In versions prior to 1.2.31authenticated user is able to perform a SQL Injection, leading to a privilege escalation or loss of confidentiality. It appears that in some insert and update operations, the code improperly uses the PicoDB library to update/insert new information. Version 1.2.31 contains a fix for this issue.","aliases":["GHSA-9gvq-78jp-jxcx"],"modified":"2026-04-16T04:43:34.020411345Z","published":"2023-07-05T21:05:53.347Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/36xxx/CVE-2023-36813.json","cwe_ids":["CWE-89"]},"references":[{"type":"WEB","url":"https://github.com/kanboard/kanboard/releases/tag/v1.2.31"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/36xxx/CVE-2023-36813.json"},{"type":"ADVISORY","url":"https://github.com/kanboard/kanboard/security/advisories/GHSA-9gvq-78jp-jxcx"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36813"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5454"},{"type":"FIX","url":"https://github.com/kanboard/kanboard/commit/25b93343baeaf8ad018dcd87b094e47a5c6a3e0a"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kanboard/kanboard","events":[{"introduced":"0"},{"fixed":"8522226367a1c374cb328ed9b2609c0686d92c16"}]}],"versions":["v1.0.0","v1.0.1","v1.0.10","v1.0.11","v1.0.12","v1.0.13","v1.0.14","v1.0.15","v1.0.16","v1.0.17","v1.0.18","v1.0.19","v1.0.2","v1.0.20","v1.0.26","v1.0.27","v1.0.28","v1.0.29","v1.0.3","v1.0.30","v1.0.31","v1.0.32","v1.0.33","v1.0.34","v1.0.35","v1.0.36","v1.0.37","v1.0.38","v1.0.39","v1.0.4","v1.0.40","v1.0.41","v1.0.42","v1.0.43","v1.0.44","v1.0.45","v1.0.46","v1.0.48","v1.0.5","v1.0.6","v1.0.7","v1.0.8","v1.0.9","v1.1.0","v1.1.1","v1.2.0","v1.2.1","v1.2.10","v1.2.11","v1.2.12","v1.2.13","v1.2.14","v1.2.15","v1.2.16","v1.2.17","v1.2.18","v1.2.19","v1.2.2","v1.2.20","v1.2.21","v1.2.22","v1.2.23","v1.2.24","v1.2.25","v1.2.26","v1.2.27","v1.2.28","v1.2.29","v1.2.3","v1.2.30","v1.2.4","v1.2.5","v1.2.6","v1.2.7","v1.2.8","v1.2.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-36813.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"}]}