Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27819: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in go-vikunja vikunja

0
High
VulnerabilityCVE-2026-27819cvecve-2026-27819cwe-22cwe-248
Published: Wed Feb 25 2026 (02/25/2026, 21:40:38 UTC)
Source: CVE Database V5
Vendor/Project: go-vikunja
Product: vikunja

Description

Vikunja is an open-source self-hosted task management platform. Prior to version 2.0.0, the restoreConfig function in vikunja/pkg/modules/dump/restore.go of the go-vikunja/vikunja repository fails to sanitize file paths within the provided ZIP archive. A maliciously crafted ZIP can bypass the intended extraction directory to overwrite arbitrary files on the host system. Additionally, we’ve discovered that a malformed archive triggers a runtime panic, crashing the process immediately after the database has been wiped permanently. The application trusts the metadata in the ZIP archive. It uses the Name attribute of the zip.File struct directly in os.OpenFile calls without validation, allowing files to be written outside the intended directory. The restoration logic assumes a specific directory structure within the ZIP. When provided with a "minimalist" malicious ZIP, the application fails to validate the length of slices derived from the archive contents. Specifically, at line 154, the code attempts to access an index of len(ms)-2 on an insufficiently populated slice, triggering a panic. Version 2.0.0 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 10:01:38 UTC

Technical Analysis

Vikunja is an open-source, self-hosted task management platform. In versions prior to 2.0.0, the restoreConfig function in the dump module (vikunja/pkg/modules/dump/restore.go) is vulnerable to a path traversal attack due to improper validation of file paths extracted from ZIP archives. The function directly uses the Name attribute from the zip.File struct in os.OpenFile calls without sanitizing or restricting the file paths to the intended extraction directory. This flaw allows an attacker to craft a malicious ZIP archive with file paths containing traversal sequences (e.g., ../) that escape the target directory and overwrite arbitrary files on the host system. Furthermore, the restoration logic assumes a specific directory structure within the ZIP archive. When given a minimalist or malformed archive, the code attempts to access an out-of-bounds index in a slice derived from the archive contents (specifically at line 154, accessing len(ms)-2), causing a runtime panic. This panic crashes the process immediately after the database has been wiped, resulting in permanent data loss. The vulnerability combines CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-248 (Uncaught Exception). The issue was fixed in version 2.0.0 by adding proper path sanitization and validation of archive contents before file operations. The CVSS 3.1 base score is 7.2, reflecting network attack vector, low attack complexity, required privileges, no user interaction, and high impact on confidentiality, integrity, and availability.

Potential Impact

This vulnerability poses a significant risk to organizations using Vikunja versions prior to 2.0.0. An authenticated attacker with access to the restore functionality can supply a crafted ZIP archive to overwrite arbitrary files on the host system, potentially leading to privilege escalation, data corruption, or system compromise. The ability to overwrite critical system or application files can disrupt operations or facilitate further attacks. Additionally, the runtime panic triggered by malformed archives causes an immediate crash after wiping the database, resulting in permanent data loss and service downtime. Organizations relying on Vikunja for task management and project tracking may face operational disruption, loss of critical data, and potential exposure of sensitive information. The requirement for authentication limits the attack surface but does not eliminate risk, especially in environments with multiple users or weak access controls. The vulnerability affects confidentiality, integrity, and availability, making it a high-impact issue.

Mitigation Recommendations

Organizations should upgrade Vikunja to version 2.0.0 or later, where this vulnerability is fixed. Until upgrading, restrict access to the restore functionality to trusted administrators only, minimizing the risk of malicious archive uploads. Implement strict input validation and sanitization on ZIP archive contents before restoration, ensuring file paths do not escape the intended extraction directory. Employ file system permissions and sandboxing to limit the impact of potential file overwrites. Regularly back up Vikunja databases and configuration files to enable recovery in case of data loss. Monitor application logs for unusual restore attempts or errors indicating malformed archives. Consider deploying runtime application self-protection (RASP) or file integrity monitoring to detect and prevent unauthorized file modifications. Finally, educate administrators on the risks of restoring from untrusted archives and enforce strong authentication and access controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:32:39.799Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f7012b7ef31ef0b5b7bc5

Added to database: 2/25/2026, 9:56:34 PM

Last enriched: 3/5/2026, 10:01:38 AM

Last updated: 4/12/2026, 3:08:42 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses