CVE-2026-33680: CWE-285: Improper Authorization in go-vikunja vikunja
CVE-2026-33680 is a high-severity improper authorization vulnerability in the open-source task management platform Vikunja versions prior to 2. 2. 2. The flaw exists in the LinkSharing. ReadAll() method, which allows authenticated users with read-only link shares to list all link shares for a project, including secret hashes of write and admin shares. This occurs because the ReadAllWeb handler bypasses the CanRead() authorization check, enabling attackers to escalate privileges from read-only to full admin access without authentication or user interaction. The vulnerability impacts confidentiality by exposing secret hashes but does not affect integrity or availability directly. The issue is patched in Vikunja version 2. 2. 2.
AI Analysis
Technical Summary
Vikunja is an open-source, self-hosted task management platform that supports link sharing with different permission levels. In versions prior to 2.2.2, a critical authorization flaw exists in the LinkSharing.ReadAll() method. Specifically, the ReadAllWeb HTTP handler allows authenticated users possessing a read-only link share to retrieve a list of all link shares associated with a project, including secret hashes for shares with write or admin privileges. Although the system correctly restricts reading individual shares via the ReadOne method using the CanRead() authorization check, the ReadAllWeb handler does not invoke this check, effectively bypassing it. This design flaw enables an attacker to obtain secret hashes of higher privilege shares and use them to authenticate as a write or admin user, thereby escalating their privileges to full administrative control over the project. The vulnerability does not require prior authentication beyond possessing a read-only link share and does not require user interaction, making exploitation straightforward. The vulnerability is tracked as CWE-285 (Improper Authorization) and has a CVSS 3.1 base score of 7.5, reflecting high severity. The issue was publicly disclosed on March 24, 2026, and fixed in Vikunja version 2.2.2. No known exploits in the wild have been reported yet.
Potential Impact
This vulnerability allows attackers with minimal access—a read-only link share—to escalate their privileges to full admin rights on a project. The impact is significant for organizations using Vikunja versions prior to 2.2.2, as attackers can gain unauthorized access to sensitive project data, modify tasks, change configurations, or delete content, potentially disrupting project workflows and compromising confidentiality. Since Vikunja is self-hosted, the risk is concentrated on organizations that deploy it internally or expose it externally. The exposure of secret hashes undermines the security model of link sharing, enabling lateral privilege escalation within the same project. Although availability and integrity impacts are indirect, the ability to gain admin access can lead to data tampering or denial of service through administrative actions. The vulnerability's ease of exploitation and lack of required user interaction increase the risk of rapid compromise once discovered.
Mitigation Recommendations
Organizations should immediately upgrade Vikunja to version 2.2.2 or later, where the authorization bypass in the ReadAllWeb handler is patched. Until upgrading, administrators should restrict access to link shares, especially read-only links, and monitor usage for suspicious activity. Implement network-level controls to limit access to the Vikunja instance to trusted users and networks. Review and audit existing link shares for unnecessary privileges and revoke any that are not essential. Consider disabling link sharing temporarily if feasible. Additionally, implement logging and alerting on access to link shares and administrative actions to detect potential exploitation attempts. Educate users about the risks of sharing links broadly. Finally, maintain regular backups of project data to recover from potential compromise.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Sweden, Switzerland, Japan
CVE-2026-33680: CWE-285: Improper Authorization in go-vikunja vikunja
Description
CVE-2026-33680 is a high-severity improper authorization vulnerability in the open-source task management platform Vikunja versions prior to 2. 2. 2. The flaw exists in the LinkSharing. ReadAll() method, which allows authenticated users with read-only link shares to list all link shares for a project, including secret hashes of write and admin shares. This occurs because the ReadAllWeb handler bypasses the CanRead() authorization check, enabling attackers to escalate privileges from read-only to full admin access without authentication or user interaction. The vulnerability impacts confidentiality by exposing secret hashes but does not affect integrity or availability directly. The issue is patched in Vikunja version 2. 2. 2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Vikunja is an open-source, self-hosted task management platform that supports link sharing with different permission levels. In versions prior to 2.2.2, a critical authorization flaw exists in the LinkSharing.ReadAll() method. Specifically, the ReadAllWeb HTTP handler allows authenticated users possessing a read-only link share to retrieve a list of all link shares associated with a project, including secret hashes for shares with write or admin privileges. Although the system correctly restricts reading individual shares via the ReadOne method using the CanRead() authorization check, the ReadAllWeb handler does not invoke this check, effectively bypassing it. This design flaw enables an attacker to obtain secret hashes of higher privilege shares and use them to authenticate as a write or admin user, thereby escalating their privileges to full administrative control over the project. The vulnerability does not require prior authentication beyond possessing a read-only link share and does not require user interaction, making exploitation straightforward. The vulnerability is tracked as CWE-285 (Improper Authorization) and has a CVSS 3.1 base score of 7.5, reflecting high severity. The issue was publicly disclosed on March 24, 2026, and fixed in Vikunja version 2.2.2. No known exploits in the wild have been reported yet.
Potential Impact
This vulnerability allows attackers with minimal access—a read-only link share—to escalate their privileges to full admin rights on a project. The impact is significant for organizations using Vikunja versions prior to 2.2.2, as attackers can gain unauthorized access to sensitive project data, modify tasks, change configurations, or delete content, potentially disrupting project workflows and compromising confidentiality. Since Vikunja is self-hosted, the risk is concentrated on organizations that deploy it internally or expose it externally. The exposure of secret hashes undermines the security model of link sharing, enabling lateral privilege escalation within the same project. Although availability and integrity impacts are indirect, the ability to gain admin access can lead to data tampering or denial of service through administrative actions. The vulnerability's ease of exploitation and lack of required user interaction increase the risk of rapid compromise once discovered.
Mitigation Recommendations
Organizations should immediately upgrade Vikunja to version 2.2.2 or later, where the authorization bypass in the ReadAllWeb handler is patched. Until upgrading, administrators should restrict access to link shares, especially read-only links, and monitor usage for suspicious activity. Implement network-level controls to limit access to the Vikunja instance to trusted users and networks. Review and audit existing link shares for unnecessary privileges and revoke any that are not essential. Consider disabling link sharing temporarily if feasible. Additionally, implement logging and alerting on access to link shares and administrative actions to detect potential exploitation attempts. Educate users about the risks of sharing links broadly. Finally, maintain regular backups of project data to recover from potential compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T16:34:59.931Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c2b56bf4197a8e3b4a0825
Added to database: 3/24/2026, 4:01:47 PM
Last enriched: 3/24/2026, 4:16:14 PM
Last updated: 3/24/2026, 5:11:33 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.