Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33679: CWE-918: Server-Side Request Forgery (SSRF) in go-vikunja vikunja

0
Medium
VulnerabilityCVE-2026-33679cvecve-2026-33679cwe-918
Published: Tue Mar 24 2026 (03/24/2026, 15:46:10 UTC)
Source: CVE Database V5
Vendor/Project: go-vikunja
Product: vikunja

Description

CVE-2026-33679 is a Server-Side Request Forgery (SSRF) vulnerability in the go-vikunja vikunja task management platform versions prior to 2. 2. 1. The flaw exists in the DownloadImage function, which uses an unprotected http. Client to fetch user avatar images from URLs specified in the OpenID Connect picture claim. An attacker controlling their OIDC profile picture URL can exploit this to make the server perform arbitrary HTTP GET requests to internal or cloud metadata endpoints, bypassing existing SSRF protections applied elsewhere. This can lead to limited confidentiality impact and partial availability impact. The vulnerability has a CVSS score of 6. 4 (medium severity) and requires low privileges but no user interaction. Organizations using vulnerable versions should upgrade to 2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 16:17:48 UTC

Technical Analysis

CVE-2026-33679 is a medium-severity SSRF vulnerability affecting go-vikunja vikunja versions before 2.2.1. Vikunja is an open-source, self-hosted task management platform that supports OpenID Connect (OIDC) for authentication. The vulnerability resides in the DownloadImage function within pkg/utils/avatar.go, which downloads user avatar images from URLs specified in the OIDC picture claim. This function uses a bare http.Client{} without any SSRF protections such as URL validation, allowlists, or network restrictions. Consequently, an attacker who can control their OIDC profile picture URL can cause the Vikunja server to make arbitrary HTTP GET requests to internal network resources or cloud provider metadata endpoints. This bypasses the SSRF protections correctly implemented in other parts of the application, such as the webhook system. The vulnerability can be exploited remotely with low privileges and no user interaction, making it relatively easy to trigger. The impact primarily affects confidentiality, as attackers may retrieve sensitive internal data or cloud metadata, and availability, if internal services are overwhelmed or manipulated. Integrity impact is minimal as the vulnerability does not allow modification of data. The issue was patched in version 2.2.1 by presumably adding SSRF protections or validating URLs before fetching images. No known exploits are reported in the wild as of the publication date. The vulnerability is tracked under CWE-918 (Server-Side Request Forgery).

Potential Impact

The primary impact of CVE-2026-33679 is unauthorized internal network reconnaissance and potential leakage of sensitive metadata from cloud environments. Attackers exploiting this SSRF can access internal services that are not exposed externally, such as cloud instance metadata endpoints, which may contain credentials or configuration data. This can lead to further compromise of cloud resources or lateral movement within an organization's network. The vulnerability can also cause partial denial of service if internal services are overwhelmed by crafted requests. Since the vulnerability requires only low privileges and no user interaction, it poses a moderate risk to organizations running vulnerable versions of Vikunja, especially those deployed in cloud or hybrid environments. However, the impact on data integrity is low, and the overall severity is medium due to limited scope and exploit complexity. Organizations with sensitive internal services accessible only via internal networks are at higher risk.

Mitigation Recommendations

1. Upgrade all Vikunja instances to version 2.2.1 or later, where the vulnerability is patched. 2. Implement strict validation and sanitization of URLs obtained from untrusted sources such as OIDC claims before making HTTP requests. Use allowlists to restrict requests to trusted domains only. 3. Employ network segmentation and firewall rules to prevent application servers from accessing sensitive internal or cloud metadata endpoints. 4. Use SSRF protection libraries or middleware that enforce safe HTTP client usage and prevent requests to private IP ranges or known metadata IPs. 5. Monitor application logs for unusual outbound HTTP requests, especially to internal IP ranges or cloud metadata URLs. 6. Review and restrict OIDC provider configurations to limit the ability of users to specify arbitrary picture URLs. 7. Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities in web applications.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T16:34:59.931Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2b56bf4197a8e3b4a0820

Added to database: 3/24/2026, 4:01:47 PM

Last enriched: 3/24/2026, 4:17:48 PM

Last updated: 3/24/2026, 5:16:41 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses