Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33676: CWE-863: Incorrect Authorization in go-vikunja vikunja

0
Medium
VulnerabilityCVE-2026-33676cvecve-2026-33676cwe-863
Published: Tue Mar 24 2026 (03/24/2026, 15:35:37 UTC)
Source: CVE Database V5
Vendor/Project: go-vikunja
Product: vikunja

Description

CVE-2026-33676 is an authorization vulnerability in the open-source task management platform Vikunja prior to version 2. 2. 1. The flaw allows authenticated users with read access to a task to receive full details of related tasks in projects they do not have permission to access. This occurs because the API populates the 'related_tasks' field with full task objects without verifying read permissions on those related tasks' projects. The exposed information includes sensitive task details such as title, description, due dates, priority, percent completion, and project IDs. The vulnerability has a CVSS score of 6. 5 (medium severity) and does not impact task integrity or availability, only confidentiality. Version 2. 2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:36:07 UTC

Technical Analysis

Vikunja is an open-source, self-hosted task management platform that allows users to manage tasks across multiple projects. In versions prior to 2.2.1, the API endpoint responsible for returning task data includes a 'related_tasks' field. This field is populated with full task objects representing tasks related to the requested task, regardless of the requesting user's permissions on those related tasks' projects. Specifically, the API does not verify whether the user has read access to the projects containing these related tasks. As a result, an authenticated user who can read a task with cross-project relations can obtain detailed information about tasks in projects they are unauthorized to access. The leaked data includes sensitive metadata such as task titles, descriptions, due dates, priority levels, percent completion, and project identifiers. This constitutes an incorrect authorization vulnerability classified under CWE-863 (Incorrect Authorization). The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a medium severity level. The attack vector is network-based, requiring low attack complexity and privileges (authenticated user), with no user interaction needed. The impact is primarily on confidentiality, as task data is exposed without integrity or availability being affected. The issue was addressed in Vikunja version 2.2.1 by adding proper authorization checks before including related task details in API responses.

Potential Impact

The primary impact of CVE-2026-33676 is unauthorized disclosure of sensitive task information across project boundaries within Vikunja deployments. Organizations using affected versions risk leaking confidential project details such as task descriptions, deadlines, priorities, and progress metrics to unauthorized users who have limited access rights. This can lead to information exposure that may compromise project confidentiality, competitive advantage, or privacy. While the vulnerability does not allow modification or deletion of data, the unauthorized visibility of sensitive task information can facilitate social engineering, insider threats, or competitive intelligence gathering. Since Vikunja is often used for internal task and project management, the exposure of cross-project task details could undermine trust in the platform and violate data protection policies. The vulnerability affects all organizations running Vikunja versions prior to 2.2.1, especially those with multi-project environments and users with varying access levels. No known exploits are reported in the wild yet, but the ease of exploitation by any authenticated user with read access to at least one task makes timely remediation important.

Mitigation Recommendations

Organizations should upgrade all Vikunja instances to version 2.2.1 or later, where the authorization checks for related tasks have been properly implemented. Until upgrading is possible, administrators can mitigate risk by restricting task read permissions to trusted users only and minimizing cross-project task relations that could expose sensitive data. Reviewing and tightening project and task access controls can reduce the attack surface. Monitoring API access logs for unusual patterns of task retrieval may help detect attempts to exploit this vulnerability. Additionally, organizations should educate users about the sensitivity of task data and enforce the principle of least privilege for task access. If custom integrations or API clients are used, they should be reviewed to ensure they do not inadvertently expose related task data. Finally, applying network-level protections such as VPNs or IP whitelisting can limit access to the Vikunja API to authorized personnel only.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T16:34:59.930Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2b56bf4197a8e3b4a0812

Added to database: 3/24/2026, 4:01:47 PM

Last enriched: 3/31/2026, 8:36:07 PM

Last updated: 5/7/2026, 4:33:47 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses