Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27575: CWE-521: Weak Password Requirements in go-vikunja vikunja

0
Critical
VulnerabilityCVE-2026-27575cvecve-2026-27575cwe-521cwe-613
Published: Wed Feb 25 2026 (02/25/2026, 21:35:23 UTC)
Source: CVE Database V5
Vendor/Project: go-vikunja
Product: vikunja

Description

CVE-2026-27575 is a critical vulnerability in go-vikunja's self-hosted task management platform versions prior to 2. 0. 0. It allows users to set weak passwords without enforcing minimum strength requirements, making brute-force or credential stuffing attacks easier. Additionally, active sessions remain valid even after a password change, enabling attackers who compromise accounts to maintain persistent access. The vulnerability has a CVSS score of 9. 1, indicating high severity with network attack vector and no user interaction required. The issue is fixed in version 2. 0. 0.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:11:51 UTC

Technical Analysis

CVE-2026-27575 identifies a critical security weakness in go-vikunja's vikunja task management platform prior to version 2.0.0. The vulnerability stems from two main issues: first, the application does not enforce strong password requirements, allowing users to set easily guessable passwords such as '1234' or 'password'. This weakness (CWE-521) significantly lowers the barrier for attackers to gain unauthorized access through brute-force or credential stuffing attacks. Second, the platform fails to invalidate active sessions after a user changes their password (CWE-613). This means that if an attacker compromises an account, they can maintain persistent access even after the legitimate user resets their password, bypassing a common remediation step. The vulnerability has a CVSS 3.1 base score of 9.1, reflecting its critical nature due to network exploitability without authentication or user interaction, and its high impact on confidentiality and integrity. Although no known exploits are currently reported in the wild, the combination of weak password enforcement and session persistence presents a significant risk. The issue was addressed in version 2.0.0 of vikunja, which enforces stronger password policies and invalidates active sessions upon password changes. Organizations running versions earlier than 2.0.0 should prioritize upgrading to mitigate this risk.

Potential Impact

The vulnerability allows attackers to compromise user accounts through weak passwords, increasing the likelihood of unauthorized access via brute-force or credential stuffing attacks. Once an account is compromised, the attacker can maintain persistent access due to the failure to invalidate active sessions after password changes. This undermines the confidentiality and integrity of user data and task management information stored within vikunja. For organizations, this could lead to unauthorized data exposure, manipulation of task assignments, and potential disruption of workflows. Since vikunja is often self-hosted, organizations may have varying levels of security maturity, increasing the risk of exploitation. The critical CVSS score indicates a high potential for damage, especially in environments where sensitive or proprietary information is managed. The lack of user interaction and network-based attack vector means attackers can exploit this remotely and automatically, increasing the threat surface. Persistent access post-password reset complicates incident response and recovery efforts.

Mitigation Recommendations

1. Upgrade all instances of vikunja to version 2.0.0 or later immediately to apply the official fix addressing weak password enforcement and session invalidation. 2. Implement additional password policies at the organizational level, such as enforcing complexity, minimum length, and prohibiting commonly used passwords, even if the application does not enforce them. 3. Configure monitoring and alerting for multiple failed login attempts to detect brute-force or credential stuffing attacks early. 4. Implement multi-factor authentication (MFA) to add an additional layer of security beyond passwords. 5. Review and enhance session management policies, including reducing session lifetimes and ensuring sessions are invalidated upon password changes or suspicious activities. 6. Educate users about the risks of weak passwords and the importance of password hygiene. 7. Regularly audit user accounts and active sessions to detect unauthorized access. 8. Consider network-level protections such as IP blacklisting or rate limiting login attempts to reduce brute-force attack feasibility.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T17:40:28.449Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f7012b7ef31ef0b5b7bbc

Added to database: 2/25/2026, 9:56:34 PM

Last enriched: 2/25/2026, 10:11:51 PM

Last updated: 2/26/2026, 7:55:16 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats