Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33312: CWE-863: Incorrect Authorization in go-vikunja vikunja

0
Medium
VulnerabilityCVE-2026-33312cvecve-2026-33312cwe-863
Published: Fri Mar 20 2026 (03/20/2026, 14:42:14 UTC)
Source: CVE Database V5
Vendor/Project: go-vikunja
Product: vikunja

Description

CVE-2026-33312 is a medium-severity authorization vulnerability in the open-source task management platform Vikunja, affecting versions from 0. 20. 2 up to but not including 2. 2. 0. The flaw arises because the DELETE /api/v1/projects/:project/background endpoint incorrectly checks for read permissions (CanRead) instead of update permissions (CanUpdate). This allows any user with read-only access to a project to delete the project's background image permanently. The vulnerability does not require authentication beyond read access and does not need user interaction. Although the impact is limited to background images, it represents an improper authorization control that could be exploited to disrupt project appearance or cause minor denial of service. The issue is fixed in version 2.

AI-Powered Analysis

AILast updated: 03/20/2026, 15:09:05 UTC

Technical Analysis

CVE-2026-33312 is an authorization vulnerability classified under CWE-863 (Incorrect Authorization) in the Vikunja task management platform, specifically in versions >= 0.20.2 and < 2.2.0. The vulnerability exists in the DELETE /api/v1/projects/:project/background API endpoint, which is designed to delete the background image of a project. Instead of verifying that the user has update permissions (CanUpdate) on the project, the endpoint erroneously checks only for read permissions (CanRead). Consequently, any user granted read-only access to a project can exploit this flaw to delete the project's background image permanently, despite lacking update privileges. This improper authorization check violates the principle of least privilege and could be leveraged to disrupt project aesthetics or cause minor denial of service. The vulnerability does not require elevated privileges beyond read access, nor does it require user interaction, making it easier to exploit in environments where read access is widely granted. The vulnerability was publicly disclosed on March 20, 2026, with a CVSS v4.0 base score of 5.3 (medium severity), reflecting its moderate impact and ease of exploitation. The issue has been resolved in Vikunja version 2.2.0, which correctly enforces CanUpdate permission on the affected endpoint.

Potential Impact

The primary impact of CVE-2026-33312 is the unauthorized deletion of project background images by users with read-only access. While this does not compromise sensitive data confidentiality or integrity of core project information, it can degrade user experience and trust in the platform by allowing unauthorized modification of project appearance. In collaborative environments, this could lead to confusion or disruption of workflows, especially if background images are used for visual cues or branding. The vulnerability does not enable deletion of project data or tasks, limiting its scope. However, the improper authorization check signals potential weaknesses in access control implementation that could be symptomatic of broader security issues if similar patterns exist elsewhere. Organizations relying on Vikunja for task management should consider the reputational and operational risks of such unauthorized actions, particularly in environments with many users having read-only access. Since the vulnerability is exploitable remotely without authentication beyond read access, it increases the attack surface in multi-tenant or shared deployments.

Mitigation Recommendations

To mitigate CVE-2026-33312, organizations should upgrade Vikunja installations to version 2.2.0 or later, where the authorization check on the DELETE /api/v1/projects/:project/background endpoint is corrected to require CanUpdate permissions. Until upgrading is possible, administrators can implement the following specific measures: 1) Restrict read-only access strictly to trusted users to minimize risk of exploitation. 2) Monitor API usage logs for suspicious DELETE requests targeting project backgrounds from users with read-only roles. 3) If feasible, disable or restrict the background image feature temporarily to prevent unauthorized deletions. 4) Conduct a thorough review of other API endpoints and permission checks to identify and remediate similar authorization weaknesses. 5) Educate users about the vulnerability and encourage reporting of unexpected changes to project backgrounds. These targeted actions complement general best practices by focusing on the specific flawed endpoint and permission model involved.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T21:23:36.676Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bd5fb1e32a4fbe5fa2ca4d

Added to database: 3/20/2026, 2:54:41 PM

Last enriched: 3/20/2026, 3:09:05 PM

Last updated: 3/20/2026, 4:59:01 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses