Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33680: CWE-285: Improper Authorization in go-vikunja vikunja

0
High
VulnerabilityCVE-2026-33680cvecve-2026-33680cwe-285
Published: Tue Mar 24 2026 (03/24/2026, 15:47:47 UTC)
Source: CVE Database V5
Vendor/Project: go-vikunja
Product: vikunja

Description

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.2, the `LinkSharing.ReadAll()` method allows link share authenticated users to list all link shares for a project, including their secret hashes. While `LinkSharing.CanRead()` correctly blocks link share users from reading individual shares via `ReadOne`, the `ReadAllWeb` handler bypasses this check by never calling `CanRead()`. An attacker with a read-only link share can retrieve hashes for write or admin link shares on the same project and authenticate with them, escalating to full admin access. Version 2.2.2 patches the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 19:51:14 UTC

Technical Analysis

Vikunja is an open-source, self-hosted task management platform that supports link sharing with different permission levels (read, write, admin). In versions prior to 2.2.2, the LinkSharing.ReadAll() method allows any authenticated user possessing a read-only link share to retrieve a list of all link shares associated with a project, including their secret hashes. These secret hashes serve as authentication tokens for the respective link shares. While the system correctly restricts reading individual shares via the ReadOne method by enforcing the CanRead() authorization check, the ReadAllWeb handler fails to invoke this check, effectively bypassing authorization controls. This design flaw enables an attacker with a read-only link share to obtain secret hashes for write and admin shares within the same project. Using these hashes, the attacker can authenticate as a higher-privileged user, escalating their access to full administrative control over the project. The vulnerability is remotely exploitable without any user interaction or prior privileges beyond possessing a read-only link share. The CVSS v3.1 base score is 7.5, reflecting high severity due to the potential for unauthorized access to sensitive project data and administrative functions. The issue was publicly disclosed and patched in Vikunja version 2.2.2, which properly enforces authorization checks in the ReadAllWeb handler to prevent unauthorized enumeration of link shares.

Potential Impact

This vulnerability allows attackers with minimal access—a read-only link share—to escalate privileges to write or admin levels within a project. The impact includes unauthorized modification or deletion of tasks, exposure of sensitive project information, and potential disruption of project workflows. For organizations relying on Vikunja for task management, this could lead to data integrity issues, loss of confidentiality, and operational disruption. Since Vikunja is self-hosted, the risk is concentrated in environments where link sharing is enabled and read-only links are distributed. Attackers could leverage this flaw to compromise project management data, potentially affecting decision-making and collaboration. The lack of required user interaction and the ability to exploit remotely increase the threat's severity. Although no known exploits are reported in the wild yet, the vulnerability's nature and ease of exploitation make it a significant risk for affected deployments.

Mitigation Recommendations

The primary mitigation is to upgrade all Vikunja instances to version 2.2.2 or later, where the authorization bypass in the ReadAllWeb handler is fixed. Until upgrades can be applied, administrators should consider disabling link sharing features or restricting the distribution of read-only link shares to trusted users only. Monitoring access logs for unusual enumeration patterns of link shares can help detect exploitation attempts. Implement network-level access controls to limit exposure of the Vikunja instance to untrusted networks. Additionally, review and audit existing link shares to revoke any unnecessary or suspicious links. Employ strong authentication and logging to detect and respond to unauthorized access quickly. Finally, educate users about the risks of sharing links with broad audiences and encourage minimal privilege sharing.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T16:34:59.931Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2b56bf4197a8e3b4a0825

Added to database: 3/24/2026, 4:01:47 PM

Last enriched: 3/31/2026, 7:51:14 PM

Last updated: 5/7/2026, 8:55:07 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses