Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28268: CWE-459: Incomplete Cleanup in go-vikunja vikunja

0
Critical
VulnerabilityCVE-2026-28268cvecve-2026-28268cwe-459cwe-640
Published: Fri Feb 27 2026 (02/27/2026, 20:16:29 UTC)
Source: CVE Database V5
Vendor/Project: go-vikunja
Product: vikunja

Description

CVE-2026-28268 is a critical vulnerability in the open-source task management platform Vikunja versions prior to 2. 1. 0. The flaw lies in the password reset mechanism where reset tokens are not invalidated after use due to incomplete cleanup and a logic bug in the token cleanup cron job. This allows attackers who obtain a single reset token—via logs, browser history, or phishing—to reuse it indefinitely, enabling persistent account takeover without needing to re-authenticate or interact with the user. The vulnerability affects confidentiality, integrity, and availability of user accounts and can be exploited remotely without privileges or user interaction. The issue is patched in version 2. 1. 0. Organizations using vulnerable Vikunja versions should upgrade immediately and review token handling and logging practices to prevent token leakage.

AI-Powered Analysis

AILast updated: 02/27/2026, 20:55:38 UTC

Technical Analysis

Vikunja is an open-source, self-hosted task management platform used by organizations to manage tasks and projects. Versions prior to 2.1.0 contain a critical business logic vulnerability (CVE-2026-28268) in the password reset functionality of the vikunja/api component. Specifically, the system fails to invalidate password reset tokens after they are used, due to a logic bug in the token cleanup cron job and incomplete cleanup (CWE-459). As a result, reset tokens remain valid indefinitely. An attacker who intercepts a reset token—through means such as compromised logs, browser history, or phishing attacks—can reuse the token at any time to reset the victim’s password and take over their account permanently. This bypasses normal authentication controls and does not require any privileges or user interaction, making exploitation straightforward and remote. The vulnerability impacts confidentiality (unauthorized access to user accounts), integrity (account takeover and potential data manipulation), and availability (potential account lockout or denial of service). The CVSS v3.1 base score is 9.8 (critical), reflecting the ease of exploitation, lack of required privileges, and severe impact. The issue is addressed in Vikunja version 2.1.0, which properly invalidates tokens upon use and fixes the token cleanup logic.

Potential Impact

The vulnerability allows attackers to perform persistent account takeovers by reusing intercepted password reset tokens indefinitely. This compromises the confidentiality of user data and tasks, the integrity of user accounts and project information, and potentially the availability of accounts if attackers lock out legitimate users. Organizations relying on Vikunja for task management risk unauthorized access to sensitive project data and internal workflows. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments where logs or browser histories are accessible or phishing is feasible. Persistent access can lead to data exfiltration, sabotage of task management processes, and lateral movement within organizational networks if Vikunja accounts are linked to other systems. The vulnerability undermines trust in the platform’s security and may lead to operational disruptions and reputational damage.

Mitigation Recommendations

1. Upgrade all Vikunja instances to version 2.1.0 or later immediately to apply the official patch that fixes token invalidation and cleanup logic. 2. Review and secure logging configurations to ensure password reset tokens are not logged or stored in accessible locations such as browser histories or shared logs. 3. Implement monitoring and alerting for unusual password reset activity or repeated use of reset tokens. 4. Educate users about phishing risks and encourage safe handling of password reset emails and tokens. 5. Consider implementing additional multi-factor authentication (MFA) on accounts to reduce the impact of compromised reset tokens. 6. Regularly audit and rotate credentials and tokens where possible. 7. If upgrading is not immediately possible, temporarily disable password reset functionality or restrict it to trusted networks until patched. 8. Conduct penetration testing and security assessments focused on authentication mechanisms to detect similar logic flaws.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T01:52:58.732Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a2016632ffcdb8a26f323f

Added to database: 2/27/2026, 8:41:10 PM

Last enriched: 2/27/2026, 8:55:38 PM

Last updated: 2/27/2026, 9:59:31 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses