Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29794: CWE-807: Reliance on Untrusted Inputs in a Security Decision in go-vikunja vikunja

0
Medium
VulnerabilityCVE-2026-29794cvecve-2026-29794cwe-807
Published: Fri Mar 20 2026 (03/20/2026, 14:39:59 UTC)
Source: CVE Database V5
Vendor/Project: go-vikunja
Product: vikunja

Description

CVE-2026-29794 is a medium severity vulnerability in the open-source task management platform Vikunja versions 0. 8 up to but not including 2. 2. 0. The issue arises because the application’s rate-limiting mechanism relies on the RealIP value derived from HTTP headers like X-Forwarded-For or X-Real-IP, which can be spoofed by unauthenticated users. This allows attackers to bypass rate limits on unauthenticated endpoints, enabling unlimited requests. The primary risk is brute-force attacks against usernames or passwords, potentially leading to account compromise. The vulnerability does not impact confidentiality or integrity directly but affects availability by allowing denial-of-service style abuse of resources. Version 2. 2.

AI-Powered Analysis

AILast updated: 03/20/2026, 15:09:20 UTC

Technical Analysis

CVE-2026-29794 is a vulnerability classified under CWE-807 (Reliance on Untrusted Inputs in a Security Decision) affecting Vikunja, an open-source self-hosted task management platform. The flaw exists in versions from 0.8 up to but not including 2.2.0, where the application’s rate-limiting logic depends on the RealIP value obtained from HTTP headers such as X-Forwarded-For or X-Real-IP. These headers can be easily spoofed by unauthenticated attackers, allowing them to circumvent the rate-limiting controls designed to restrict the number of requests from a single IP address. This bypass enables attackers to send unlimited requests to unauthenticated endpoints, which can be abused for brute-force attacks targeting user authentication mechanisms. Although the vulnerability does not directly compromise confidentiality or integrity, it undermines availability by allowing excessive resource consumption and potential service degradation. The vulnerability was publicly disclosed on March 20, 2026, with a CVSS 3.1 base score of 5.3 (medium severity), reflecting its network attack vector, low complexity, no privileges or user interaction required, and limited impact on availability. The issue is resolved in Vikunja version 2.2.0, which removes the reliance on untrusted HTTP headers for rate-limiting decisions.

Potential Impact

The primary impact of this vulnerability is the ability for unauthenticated attackers to bypass rate limits, enabling unlimited requests to unauthenticated endpoints. This can facilitate brute-force attacks against user accounts, increasing the risk of credential compromise and unauthorized access. Additionally, the unchecked request volume can degrade service availability, potentially leading to denial-of-service conditions. Organizations relying on Vikunja for task management may experience service disruptions or account compromises if attackers exploit this flaw. While the vulnerability does not directly expose sensitive data or allow code execution, the indirect effects on authentication and service stability can have significant operational and security consequences. The risk is heightened in environments where Vikunja is exposed to the internet without additional protective controls such as web application firewalls or IP filtering.

Mitigation Recommendations

1. Upgrade Vikunja to version 2.2.0 or later, where the vulnerability is patched and rate-limiting no longer relies on untrusted HTTP headers. 2. If immediate upgrade is not feasible, implement network-level controls such as web application firewalls (WAFs) or reverse proxies that validate or strip suspicious X-Forwarded-For and X-Real-IP headers to prevent spoofing. 3. Employ additional authentication protections like account lockout policies, multi-factor authentication (MFA), and CAPTCHA challenges on login endpoints to mitigate brute-force attempts. 4. Monitor application logs and network traffic for unusual request patterns indicative of rate-limit bypass or brute-force activity. 5. Restrict access to Vikunja instances to trusted networks or VPNs where possible to reduce exposure to unauthenticated attackers. 6. Conduct regular security assessments and penetration testing to verify the effectiveness of mitigations and detect any residual weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T16:26:02.900Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bd5fb1e32a4fbe5fa2ca49

Added to database: 3/20/2026, 2:54:41 PM

Last enriched: 3/20/2026, 3:09:20 PM

Last updated: 3/20/2026, 4:59:00 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses