๐Ÿ” CVE Alert

CVE-2026-32255

HIGH 8.6

Kan is Vulnerable to Unauthenticated SSRF via Attachment Download Endpoint

CVSS Score
8.6
EPSS Score
0.0%
EPSS Percentile
0th

Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts a user-supplied URL query parameter and passes it directly to fetch() server-side, and returns the full response body. An unauthenticated attacker can use this to make HTTP requests from the server to internal services, cloud metadata endpoints, or private network resources. This issue has been fixed in version 0.5.5. To workaround this issue, block or restrict access to /api/download/attatchment at the reverse proxy level (nginx, Cloudflare, etc.).

CWE CWE-918
Vendor kanbn
Product kan
Published Mar 18, 2026
Last Updated Mar 19, 2026
Stay Ahead of the Next One

Get instant alerts for kanbn kan

Be the first to know when new high vulnerabilities affecting kanbn kan are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

kanbn / kan
< 0.5.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/kanbn/kan/security/advisories/GHSA-qrx8-9hc6-jvqg github.com: https://github.com/kanbn/kan/commit/53397d8e81dc1494d94132848c1f0416f1152bd7 github.com: https://github.com/kanbn/kan/releases/tag/v0.5.5