CVE-2026-33676: CWE-863: Incorrect Authorization in go-vikunja vikunja
CVE-2026-33676 is an authorization vulnerability in the open-source task management platform Vikunja prior to version 2. 2. 1. The flaw allows authenticated users with read access to a task to receive full details of related tasks in projects they do not have permission to access. This occurs because the API populates the 'related_tasks' field with full task objects without verifying read permissions on those related tasks' projects. The exposed information includes sensitive task details such as title, description, due dates, priority, percent completion, and project IDs. The vulnerability has a CVSS score of 6. 5 (medium severity) and does not impact task integrity or availability, only confidentiality. Version 2. 2.
AI Analysis
Technical Summary
Vikunja is an open-source, self-hosted task management platform that allows users to manage tasks across multiple projects. In versions prior to 2.2.1, the API endpoint responsible for returning task data includes a 'related_tasks' field. This field is populated with full task objects representing tasks related to the requested task, regardless of the requesting user's permissions on those related tasks' projects. Specifically, the API does not verify whether the user has read access to the projects containing these related tasks. As a result, an authenticated user who can read a task with cross-project relations can obtain detailed information about tasks in projects they are unauthorized to access. The leaked data includes sensitive metadata such as task titles, descriptions, due dates, priority levels, percent completion, and project identifiers. This constitutes an incorrect authorization vulnerability classified under CWE-863 (Incorrect Authorization). The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a medium severity level. The attack vector is network-based, requiring low attack complexity and privileges (authenticated user), with no user interaction needed. The impact is primarily on confidentiality, as task data is exposed without integrity or availability being affected. The issue was addressed in Vikunja version 2.2.1 by adding proper authorization checks before including related task details in API responses.
Potential Impact
The primary impact of CVE-2026-33676 is unauthorized disclosure of sensitive task information across project boundaries within Vikunja deployments. Organizations using affected versions risk leaking confidential project details such as task descriptions, deadlines, priorities, and progress metrics to unauthorized users who have limited access rights. This can lead to information exposure that may compromise project confidentiality, competitive advantage, or privacy. While the vulnerability does not allow modification or deletion of data, the unauthorized visibility of sensitive task information can facilitate social engineering, insider threats, or competitive intelligence gathering. Since Vikunja is often used for internal task and project management, the exposure of cross-project task details could undermine trust in the platform and violate data protection policies. The vulnerability affects all organizations running Vikunja versions prior to 2.2.1, especially those with multi-project environments and users with varying access levels. No known exploits are reported in the wild yet, but the ease of exploitation by any authenticated user with read access to at least one task makes timely remediation important.
Mitigation Recommendations
Organizations should upgrade all Vikunja instances to version 2.2.1 or later, where the authorization checks for related tasks have been properly implemented. Until upgrading is possible, administrators can mitigate risk by restricting task read permissions to trusted users only and minimizing cross-project task relations that could expose sensitive data. Reviewing and tightening project and task access controls can reduce the attack surface. Monitoring API access logs for unusual patterns of task retrieval may help detect attempts to exploit this vulnerability. Additionally, organizations should educate users about the sensitivity of task data and enforce the principle of least privilege for task access. If custom integrations or API clients are used, they should be reviewed to ensure they do not inadvertently expose related task data. Finally, applying network-level protections such as VPNs or IP whitelisting can limit access to the Vikunja API to authorized personnel only.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Sweden, Switzerland, Japan
CVE-2026-33676: CWE-863: Incorrect Authorization in go-vikunja vikunja
Description
CVE-2026-33676 is an authorization vulnerability in the open-source task management platform Vikunja prior to version 2. 2. 1. The flaw allows authenticated users with read access to a task to receive full details of related tasks in projects they do not have permission to access. This occurs because the API populates the 'related_tasks' field with full task objects without verifying read permissions on those related tasks' projects. The exposed information includes sensitive task details such as title, description, due dates, priority, percent completion, and project IDs. The vulnerability has a CVSS score of 6. 5 (medium severity) and does not impact task integrity or availability, only confidentiality. Version 2. 2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Vikunja is an open-source, self-hosted task management platform that allows users to manage tasks across multiple projects. In versions prior to 2.2.1, the API endpoint responsible for returning task data includes a 'related_tasks' field. This field is populated with full task objects representing tasks related to the requested task, regardless of the requesting user's permissions on those related tasks' projects. Specifically, the API does not verify whether the user has read access to the projects containing these related tasks. As a result, an authenticated user who can read a task with cross-project relations can obtain detailed information about tasks in projects they are unauthorized to access. The leaked data includes sensitive metadata such as task titles, descriptions, due dates, priority levels, percent completion, and project identifiers. This constitutes an incorrect authorization vulnerability classified under CWE-863 (Incorrect Authorization). The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a medium severity level. The attack vector is network-based, requiring low attack complexity and privileges (authenticated user), with no user interaction needed. The impact is primarily on confidentiality, as task data is exposed without integrity or availability being affected. The issue was addressed in Vikunja version 2.2.1 by adding proper authorization checks before including related task details in API responses.
Potential Impact
The primary impact of CVE-2026-33676 is unauthorized disclosure of sensitive task information across project boundaries within Vikunja deployments. Organizations using affected versions risk leaking confidential project details such as task descriptions, deadlines, priorities, and progress metrics to unauthorized users who have limited access rights. This can lead to information exposure that may compromise project confidentiality, competitive advantage, or privacy. While the vulnerability does not allow modification or deletion of data, the unauthorized visibility of sensitive task information can facilitate social engineering, insider threats, or competitive intelligence gathering. Since Vikunja is often used for internal task and project management, the exposure of cross-project task details could undermine trust in the platform and violate data protection policies. The vulnerability affects all organizations running Vikunja versions prior to 2.2.1, especially those with multi-project environments and users with varying access levels. No known exploits are reported in the wild yet, but the ease of exploitation by any authenticated user with read access to at least one task makes timely remediation important.
Mitigation Recommendations
Organizations should upgrade all Vikunja instances to version 2.2.1 or later, where the authorization checks for related tasks have been properly implemented. Until upgrading is possible, administrators can mitigate risk by restricting task read permissions to trusted users only and minimizing cross-project task relations that could expose sensitive data. Reviewing and tightening project and task access controls can reduce the attack surface. Monitoring API access logs for unusual patterns of task retrieval may help detect attempts to exploit this vulnerability. Additionally, organizations should educate users about the sensitivity of task data and enforce the principle of least privilege for task access. If custom integrations or API clients are used, they should be reviewed to ensure they do not inadvertently expose related task data. Finally, applying network-level protections such as VPNs or IP whitelisting can limit access to the Vikunja API to authorized personnel only.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T16:34:59.930Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c2b56bf4197a8e3b4a0812
Added to database: 3/24/2026, 4:01:47 PM
Last enriched: 3/31/2026, 8:36:07 PM
Last updated: 5/7/2026, 4:33:47 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.