skip to content
LG

Léo Grambert

Web Developer

France

Currently exploring cybersecurity through vulnerability research, CTF competitions, and open-source security tools.

Projects

Loading contributions...

Less
More

CVE Reported

CVE-2026-32255
Mar 2026
High 8.6

Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts a user-supplied URL query parameter and passes it directly to fetch() server-side, and returns the full response body. An unauthenticated attacker can use this to make HTTP requests from the server to internal services, cloud metadata endpoints, or private network resources. This issue has been fixed in version 0.5.5. To workaround this issue, block or restrict access to /api/download/attatchment at the reverse proxy level (nginx, Cloudflare, etc.).

Proof of Concepts

CVE-2026-32255

This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool.

2
CVE-2025-55182

This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell.

12 3 forks
CVE-2025-29927

This repository contains a POC and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in middleware.

6 3 forks

OSS Contributions

42.5k
usebruno/ bruno

Opensource IDE For Exploring and Testing API's (lightweight alternative to Postman/Insomnia)

JavaScript MIT 2.3k forks
6.8k
infoslack/ awesome-web-hacking

A list of web application security

MIT 1.3k forks
4.6k
kanbn/ kan

The open source Trello alternative.

TypeScript AGPL-3.0 304 forks
1.3k
OWASP/ www-community

OWASP Community Pages are a place where OWASP can accept community contributions for security-related content.

HTML 825 forks
84
OWASP/ www-project-vulnerable-web-applications-directory

The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

HTML CC-BY-SA-4.0 46 forks

Publications

Technical Stack

Programming Languages

JavaScript TypeScript Python PHP Ruby

Web Frameworks

React Next.js Node.js FastAPI Ruby on Rails Symfony Hapi.js

Security

Vulnerability Research CVE Analysis CTF Challenges Web Application Security

DevOps & Tools

Git CI/CD Docker Linux Shell Scripting

Certificate Archive

119 certificates indexed