Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33473: CWE-287: Improper Authentication in go-vikunja vikunja

0
Medium
VulnerabilityCVE-2026-33473cvecve-2026-33473cwe-287
Published: Tue Mar 24 2026 (03/24/2026, 15:18:14 UTC)
Source: CVE Database V5
Vendor/Project: go-vikunja
Product: vikunja

Description

Vikunja is an open-source self-hosted task management platform. Starting in version 0.13 and prior to version 2.2.1, any user that has enabled 2FA can have their TOTP reused during the standard 30 second validity window. Version 2.2.1 patches the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 16:06:18 UTC

Technical Analysis

CVE-2026-33473 identifies an improper authentication vulnerability (CWE-287) in the go-vikunja Vikunja platform, an open-source, self-hosted task management system. The vulnerability exists in versions from 0.13 up to but not including 2.2.1. It specifically affects the implementation of two-factor authentication (2FA) using Time-based One-Time Passwords (TOTP). Normally, TOTP codes are valid for a 30-second window and intended for one-time use to enhance security. However, this vulnerability allows a user with 2FA enabled to reuse the same TOTP multiple times within that 30-second window, effectively bypassing the intended one-time use constraint. This flaw arises from improper validation logic that does not prevent reuse of the same TOTP within its validity period. The CVSS 3.1 base score is 5.7 (medium severity), reflecting that the attack vector is network-based with low attack complexity, requiring privileges and user interaction. The impact is primarily on confidentiality, as unauthorized access to user accounts or data could occur without affecting data integrity or system availability. The vulnerability was publicly disclosed on March 24, 2026, and fixed in Vikunja version 2.2.1. No known exploits have been reported in the wild to date. The flaw is significant because it undermines the security guarantees of 2FA, a critical defense mechanism for user authentication in modern applications.

Potential Impact

This vulnerability can allow attackers with some level of access (e.g., a user account) to reuse a valid TOTP within its 30-second window to authenticate multiple times, potentially escalating privileges or accessing sensitive information without proper authorization. The confidentiality of user data and task management information could be compromised. Although the vulnerability does not affect data integrity or availability, unauthorized access could lead to data leakage or privacy violations. Organizations relying on Vikunja for task and project management, especially those handling sensitive or proprietary information, face increased risk of account compromise. The ease of exploitation (low complexity, network accessible) combined with the widespread use of 2FA means attackers could automate attempts to reuse TOTPs, increasing the threat surface. This could undermine trust in the platform’s security and lead to compliance issues if sensitive data is exposed.

Mitigation Recommendations

The primary mitigation is to upgrade all Vikunja installations to version 2.2.1 or later, where the vulnerability is patched. For organizations unable to immediately upgrade, consider temporarily disabling 2FA or enforcing additional authentication checks to prevent TOTP reuse, such as implementing server-side tracking of used TOTPs within their validity window. Monitoring authentication logs for repeated TOTP usage and anomalous login patterns can help detect exploitation attempts. Educate users on the importance of timely software updates and secure 2FA practices. Additionally, consider integrating external 2FA providers with more robust replay protection mechanisms. Regularly audit and review authentication mechanisms to ensure compliance with best practices. Finally, maintain an incident response plan to quickly address any suspected account compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T16:16:48.969Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2b1b2f4197a8e3b48d1ad

Added to database: 3/24/2026, 3:45:54 PM

Last enriched: 3/24/2026, 4:06:18 PM

Last updated: 3/26/2026, 5:26:22 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses