High (8.6)

CVE-2026-32255: Kan RCE — Patch Guide [PoC]

CVE-2026-32255

Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts...

Overview

A critical security vulnerability, identified as CVE-2026-32255, has been discovered in the Kan open-source project management tool. This flaw is a Server-Side Request Forgery (SSRF) vulnerability that affects versions 0.5.4 and below. It allows an unauthenticated attacker to force the Kan server to make unauthorized HTTP requests to internal systems.

Vulnerability Details

In vulnerable versions, a specific API endpoint (/api/download/attatchment) lacks any authentication checks and does not validate user-supplied input. An attacker can send a direct request to this endpoint with a malicious URL in the query parameters. The server-side code then passes this untrusted URL directly to a fetch() function, retrieves the response, and forwards it back to the attacker.

This bypasses normal security boundaries because the request originates from the Kan server itself, which is often trusted within a network. The vulnerability is particularly severe because it requires no authentication, making it exploitable by anyone who can reach the application.

Impact and Risks

The primary risk is unauthorized access to sensitive internal resources. An attacker can exploit this flaw to:

  • Scan and attack internal services: Access databases, file servers, or administrative panels running on the private network.
  • Access cloud metadata: Retrieve sensitive instance metadata from cloud platforms (like AWS IMDS), potentially obtaining credentials and secrets.
  • Exfiltrate data: Read information from systems that should not be exposed to the internet.
  • Perform reconnaissance: Map the internal network to plan further attacks.

This type of vulnerability is a common vector for significant data breaches. For context on how such flaws can lead to major incidents, you can review historical breach reports.

Remediation and Mitigation

The Kan development team has released a fix in version 0.5.5. The primary and most critical action is to upgrade your Kan installation to version 0.5.5 or later immediately.

If an immediate upgrade is not possible, implement this workaround:

  • Block the endpoint: Configure your reverse proxy (e.g., nginx, Apache, Cloudflare) to block or restrict all access to the path /api/download/attatchment. This will prevent exploitation while you schedule the upgrade.

After applying the fix, it is advisable to review server logs for any suspicious requests to the affected endpoint and consider rotating any internal credentials that may have been exposed. Staying informed on such vulnerabilities is crucial for IT security; you can follow the latest developments in security news.

Summary of Actions:

  1. Immediate Priority: Upgrade Kan to version 0.5.5.
  2. Temporary Mitigation: Block /api/download/attatchment at the reverse proxy.
  3. Post-Update: Review logs and monitor for suspicious activity.
Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Public PoC References

Unverified third-party code

These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).

Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.

Repository Stars
kOaDT/poc-cve-2026-32255

This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool.

★ 2

Showing 1 of 1 known references. Source: nomi-sec/PoC-in-GitHub.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.