Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33334: CWE-94: Improper Control of Generation of Code ('Code Injection') in go-vikunja vikunja

0
Medium
VulnerabilityCVE-2026-33334cvecve-2026-33334cwe-94cwe-269
Published: Tue Mar 24 2026 (03/24/2026, 15:02:20 UTC)
Source: CVE Database V5
Vendor/Project: go-vikunja
Product: vikunja

Description

Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper enables `nodeIntegration` in the renderer process without `contextIsolation` or `sandbox`. This means any cross-site scripting (XSS) vulnerability in the Vikunja web frontend -- present or future -- automatically escalates to full remote code execution on the victim's machine, as injected scripts gain access to Node.js APIs. Version 2.2.0 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 16:07:44 UTC

Technical Analysis

The vulnerability identified as CVE-2026-33334 affects Vikunja, a self-hosted open-source task management platform, specifically its Electron-based desktop wrapper versions from 0.21.0 up to but not including 2.2.0. The root cause lies in the Electron wrapper enabling nodeIntegration in the renderer process without enabling contextIsolation or sandboxing. Electron's nodeIntegration allows JavaScript running in the renderer process to access Node.js APIs, which are powerful and can interact with the underlying operating system. Without contextIsolation or sandbox, any malicious script injected via cross-site scripting (XSS) vulnerabilities in the Vikunja web frontend can execute arbitrary code with the privileges of the user running the desktop application. This effectively escalates an XSS vulnerability, which normally affects only the web context, into a full remote code execution (RCE) vulnerability on the victim's machine. The vulnerability does not require authentication and can be triggered remotely if the victim visits a maliciously crafted page or if an attacker exploits an XSS flaw in the legitimate Vikunja frontend. The CVSS 4.0 score of 6.5 reflects a medium severity, considering the network attack vector, no privileges required, but user interaction is necessary. The scope is high because the vulnerability affects the victim's local system beyond the application sandbox. The issue is resolved in Vikunja version 2.2.0 by disabling nodeIntegration or enabling contextIsolation and sandboxing, thus preventing injected scripts from accessing Node.js APIs. No known exploits have been reported in the wild as of the publication date.

Potential Impact

This vulnerability poses a significant risk to organizations using affected versions of Vikunja, especially those deploying the desktop Electron application. Successful exploitation can lead to full remote code execution on the victim's machine, allowing attackers to execute arbitrary commands, install malware, steal sensitive data, or move laterally within a network. Since Vikunja is often self-hosted and used for task and project management, compromise could expose confidential business information and credentials. The requirement for user interaction (e.g., opening a malicious link or visiting a compromised page) limits mass exploitation but targeted attacks against high-value users are feasible. The vulnerability's escalation from XSS to RCE increases the severity of any existing or future XSS flaws in the Vikunja frontend. Organizations with remote or hybrid workforces using the desktop app are particularly at risk. The lack of sandboxing and context isolation increases the attack surface and potential damage. Although no known exploits exist yet, the vulnerability is likely to attract attacker interest due to the ease of escalation and potential impact.

Mitigation Recommendations

Organizations should immediately upgrade Vikunja to version 2.2.0 or later, where the vulnerability is fixed by disabling nodeIntegration or enabling contextIsolation and sandboxing in the Electron wrapper. Until upgrading is possible, users should avoid opening untrusted links or content within the Vikunja desktop app. Administrators should audit and remediate any existing XSS vulnerabilities in the Vikunja web frontend to reduce the risk of exploitation. Network-level protections such as web filtering and endpoint security solutions can help detect and block malicious payloads. Employing application allowlisting and restricting user privileges on endpoints can limit the impact of potential exploitation. Monitoring for unusual process behavior or network connections from the Vikunja app may provide early detection of compromise. Finally, educating users about the risks of phishing and malicious links in the context of the Vikunja app can reduce successful exploitation likelihood.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T22:15:11.812Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2b1b2f4197a8e3b48d1a1

Added to database: 3/24/2026, 3:45:54 PM

Last enriched: 3/24/2026, 4:07:44 PM

Last updated: 3/26/2026, 5:34:02 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses