CVE-2026-33334: CWE-94: Improper Control of Generation of Code ('Code Injection') in go-vikunja vikunja
Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper enables `nodeIntegration` in the renderer process without `contextIsolation` or `sandbox`. This means any cross-site scripting (XSS) vulnerability in the Vikunja web frontend -- present or future -- automatically escalates to full remote code execution on the victim's machine, as injected scripts gain access to Node.js APIs. Version 2.2.0 fixes the issue.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-33334 affects Vikunja, a self-hosted open-source task management platform, specifically its Electron-based desktop wrapper versions from 0.21.0 up to but not including 2.2.0. The root cause lies in the Electron wrapper enabling nodeIntegration in the renderer process without enabling contextIsolation or sandboxing. Electron's nodeIntegration allows JavaScript running in the renderer process to access Node.js APIs, which are powerful and can interact with the underlying operating system. Without contextIsolation or sandbox, any malicious script injected via cross-site scripting (XSS) vulnerabilities in the Vikunja web frontend can execute arbitrary code with the privileges of the user running the desktop application. This effectively escalates an XSS vulnerability, which normally affects only the web context, into a full remote code execution (RCE) vulnerability on the victim's machine. The vulnerability does not require authentication and can be triggered remotely if the victim visits a maliciously crafted page or if an attacker exploits an XSS flaw in the legitimate Vikunja frontend. The CVSS 4.0 score of 6.5 reflects a medium severity, considering the network attack vector, no privileges required, but user interaction is necessary. The scope is high because the vulnerability affects the victim's local system beyond the application sandbox. The issue is resolved in Vikunja version 2.2.0 by disabling nodeIntegration or enabling contextIsolation and sandboxing, thus preventing injected scripts from accessing Node.js APIs. No known exploits have been reported in the wild as of the publication date.
Potential Impact
This vulnerability poses a significant risk to organizations using affected versions of Vikunja, especially those deploying the desktop Electron application. Successful exploitation can lead to full remote code execution on the victim's machine, allowing attackers to execute arbitrary commands, install malware, steal sensitive data, or move laterally within a network. Since Vikunja is often self-hosted and used for task and project management, compromise could expose confidential business information and credentials. The requirement for user interaction (e.g., opening a malicious link or visiting a compromised page) limits mass exploitation but targeted attacks against high-value users are feasible. The vulnerability's escalation from XSS to RCE increases the severity of any existing or future XSS flaws in the Vikunja frontend. Organizations with remote or hybrid workforces using the desktop app are particularly at risk. The lack of sandboxing and context isolation increases the attack surface and potential damage. Although no known exploits exist yet, the vulnerability is likely to attract attacker interest due to the ease of escalation and potential impact.
Mitigation Recommendations
Organizations should immediately upgrade Vikunja to version 2.2.0 or later, where the vulnerability is fixed by disabling nodeIntegration or enabling contextIsolation and sandboxing in the Electron wrapper. Until upgrading is possible, users should avoid opening untrusted links or content within the Vikunja desktop app. Administrators should audit and remediate any existing XSS vulnerabilities in the Vikunja web frontend to reduce the risk of exploitation. Network-level protections such as web filtering and endpoint security solutions can help detect and block malicious payloads. Employing application allowlisting and restricting user privileges on endpoints can limit the impact of potential exploitation. Monitoring for unusual process behavior or network connections from the Vikunja app may provide early detection of compromise. Finally, educating users about the risks of phishing and malicious links in the context of the Vikunja app can reduce successful exploitation likelihood.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Sweden, Switzerland, Japan
CVE-2026-33334: CWE-94: Improper Control of Generation of Code ('Code Injection') in go-vikunja vikunja
Description
Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper enables `nodeIntegration` in the renderer process without `contextIsolation` or `sandbox`. This means any cross-site scripting (XSS) vulnerability in the Vikunja web frontend -- present or future -- automatically escalates to full remote code execution on the victim's machine, as injected scripts gain access to Node.js APIs. Version 2.2.0 fixes the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-33334 affects Vikunja, a self-hosted open-source task management platform, specifically its Electron-based desktop wrapper versions from 0.21.0 up to but not including 2.2.0. The root cause lies in the Electron wrapper enabling nodeIntegration in the renderer process without enabling contextIsolation or sandboxing. Electron's nodeIntegration allows JavaScript running in the renderer process to access Node.js APIs, which are powerful and can interact with the underlying operating system. Without contextIsolation or sandbox, any malicious script injected via cross-site scripting (XSS) vulnerabilities in the Vikunja web frontend can execute arbitrary code with the privileges of the user running the desktop application. This effectively escalates an XSS vulnerability, which normally affects only the web context, into a full remote code execution (RCE) vulnerability on the victim's machine. The vulnerability does not require authentication and can be triggered remotely if the victim visits a maliciously crafted page or if an attacker exploits an XSS flaw in the legitimate Vikunja frontend. The CVSS 4.0 score of 6.5 reflects a medium severity, considering the network attack vector, no privileges required, but user interaction is necessary. The scope is high because the vulnerability affects the victim's local system beyond the application sandbox. The issue is resolved in Vikunja version 2.2.0 by disabling nodeIntegration or enabling contextIsolation and sandboxing, thus preventing injected scripts from accessing Node.js APIs. No known exploits have been reported in the wild as of the publication date.
Potential Impact
This vulnerability poses a significant risk to organizations using affected versions of Vikunja, especially those deploying the desktop Electron application. Successful exploitation can lead to full remote code execution on the victim's machine, allowing attackers to execute arbitrary commands, install malware, steal sensitive data, or move laterally within a network. Since Vikunja is often self-hosted and used for task and project management, compromise could expose confidential business information and credentials. The requirement for user interaction (e.g., opening a malicious link or visiting a compromised page) limits mass exploitation but targeted attacks against high-value users are feasible. The vulnerability's escalation from XSS to RCE increases the severity of any existing or future XSS flaws in the Vikunja frontend. Organizations with remote or hybrid workforces using the desktop app are particularly at risk. The lack of sandboxing and context isolation increases the attack surface and potential damage. Although no known exploits exist yet, the vulnerability is likely to attract attacker interest due to the ease of escalation and potential impact.
Mitigation Recommendations
Organizations should immediately upgrade Vikunja to version 2.2.0 or later, where the vulnerability is fixed by disabling nodeIntegration or enabling contextIsolation and sandboxing in the Electron wrapper. Until upgrading is possible, users should avoid opening untrusted links or content within the Vikunja desktop app. Administrators should audit and remediate any existing XSS vulnerabilities in the Vikunja web frontend to reduce the risk of exploitation. Network-level protections such as web filtering and endpoint security solutions can help detect and block malicious payloads. Employing application allowlisting and restricting user privileges on endpoints can limit the impact of potential exploitation. Monitoring for unusual process behavior or network connections from the Vikunja app may provide early detection of compromise. Finally, educating users about the risks of phishing and malicious links in the context of the Vikunja app can reduce successful exploitation likelihood.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-18T22:15:11.812Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c2b1b2f4197a8e3b48d1a1
Added to database: 3/24/2026, 3:45:54 PM
Last enriched: 3/24/2026, 4:07:44 PM
Last updated: 3/26/2026, 5:34:02 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.