CVE-2026-33680: CWE-285: Improper Authorization in go-vikunja vikunja
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.2, the `LinkSharing.ReadAll()` method allows link share authenticated users to list all link shares for a project, including their secret hashes. While `LinkSharing.CanRead()` correctly blocks link share users from reading individual shares via `ReadOne`, the `ReadAllWeb` handler bypasses this check by never calling `CanRead()`. An attacker with a read-only link share can retrieve hashes for write or admin link shares on the same project and authenticate with them, escalating to full admin access. Version 2.2.2 patches the issue.
AI Analysis
Technical Summary
Vikunja is an open-source, self-hosted task management platform that supports link sharing with different permission levels (read, write, admin). In versions prior to 2.2.2, the LinkSharing.ReadAll() method allows any authenticated user possessing a read-only link share to retrieve a list of all link shares associated with a project, including their secret hashes. These secret hashes serve as authentication tokens for the respective link shares. While the system correctly restricts reading individual shares via the ReadOne method by enforcing the CanRead() authorization check, the ReadAllWeb handler fails to invoke this check, effectively bypassing authorization controls. This design flaw enables an attacker with a read-only link share to obtain secret hashes for write and admin shares within the same project. Using these hashes, the attacker can authenticate as a higher-privileged user, escalating their access to full administrative control over the project. The vulnerability is remotely exploitable without any user interaction or prior privileges beyond possessing a read-only link share. The CVSS v3.1 base score is 7.5, reflecting high severity due to the potential for unauthorized access to sensitive project data and administrative functions. The issue was publicly disclosed and patched in Vikunja version 2.2.2, which properly enforces authorization checks in the ReadAllWeb handler to prevent unauthorized enumeration of link shares.
Potential Impact
This vulnerability allows attackers with minimal access—a read-only link share—to escalate privileges to write or admin levels within a project. The impact includes unauthorized modification or deletion of tasks, exposure of sensitive project information, and potential disruption of project workflows. For organizations relying on Vikunja for task management, this could lead to data integrity issues, loss of confidentiality, and operational disruption. Since Vikunja is self-hosted, the risk is concentrated in environments where link sharing is enabled and read-only links are distributed. Attackers could leverage this flaw to compromise project management data, potentially affecting decision-making and collaboration. The lack of required user interaction and the ability to exploit remotely increase the threat's severity. Although no known exploits are reported in the wild yet, the vulnerability's nature and ease of exploitation make it a significant risk for affected deployments.
Mitigation Recommendations
The primary mitigation is to upgrade all Vikunja instances to version 2.2.2 or later, where the authorization bypass in the ReadAllWeb handler is fixed. Until upgrades can be applied, administrators should consider disabling link sharing features or restricting the distribution of read-only link shares to trusted users only. Monitoring access logs for unusual enumeration patterns of link shares can help detect exploitation attempts. Implement network-level access controls to limit exposure of the Vikunja instance to untrusted networks. Additionally, review and audit existing link shares to revoke any unnecessary or suspicious links. Employ strong authentication and logging to detect and respond to unauthorized access quickly. Finally, educate users about the risks of sharing links with broad audiences and encourage minimal privilege sharing.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Sweden, Switzerland, Japan
CVE-2026-33680: CWE-285: Improper Authorization in go-vikunja vikunja
Description
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.2, the `LinkSharing.ReadAll()` method allows link share authenticated users to list all link shares for a project, including their secret hashes. While `LinkSharing.CanRead()` correctly blocks link share users from reading individual shares via `ReadOne`, the `ReadAllWeb` handler bypasses this check by never calling `CanRead()`. An attacker with a read-only link share can retrieve hashes for write or admin link shares on the same project and authenticate with them, escalating to full admin access. Version 2.2.2 patches the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Vikunja is an open-source, self-hosted task management platform that supports link sharing with different permission levels (read, write, admin). In versions prior to 2.2.2, the LinkSharing.ReadAll() method allows any authenticated user possessing a read-only link share to retrieve a list of all link shares associated with a project, including their secret hashes. These secret hashes serve as authentication tokens for the respective link shares. While the system correctly restricts reading individual shares via the ReadOne method by enforcing the CanRead() authorization check, the ReadAllWeb handler fails to invoke this check, effectively bypassing authorization controls. This design flaw enables an attacker with a read-only link share to obtain secret hashes for write and admin shares within the same project. Using these hashes, the attacker can authenticate as a higher-privileged user, escalating their access to full administrative control over the project. The vulnerability is remotely exploitable without any user interaction or prior privileges beyond possessing a read-only link share. The CVSS v3.1 base score is 7.5, reflecting high severity due to the potential for unauthorized access to sensitive project data and administrative functions. The issue was publicly disclosed and patched in Vikunja version 2.2.2, which properly enforces authorization checks in the ReadAllWeb handler to prevent unauthorized enumeration of link shares.
Potential Impact
This vulnerability allows attackers with minimal access—a read-only link share—to escalate privileges to write or admin levels within a project. The impact includes unauthorized modification or deletion of tasks, exposure of sensitive project information, and potential disruption of project workflows. For organizations relying on Vikunja for task management, this could lead to data integrity issues, loss of confidentiality, and operational disruption. Since Vikunja is self-hosted, the risk is concentrated in environments where link sharing is enabled and read-only links are distributed. Attackers could leverage this flaw to compromise project management data, potentially affecting decision-making and collaboration. The lack of required user interaction and the ability to exploit remotely increase the threat's severity. Although no known exploits are reported in the wild yet, the vulnerability's nature and ease of exploitation make it a significant risk for affected deployments.
Mitigation Recommendations
The primary mitigation is to upgrade all Vikunja instances to version 2.2.2 or later, where the authorization bypass in the ReadAllWeb handler is fixed. Until upgrades can be applied, administrators should consider disabling link sharing features or restricting the distribution of read-only link shares to trusted users only. Monitoring access logs for unusual enumeration patterns of link shares can help detect exploitation attempts. Implement network-level access controls to limit exposure of the Vikunja instance to untrusted networks. Additionally, review and audit existing link shares to revoke any unnecessary or suspicious links. Employ strong authentication and logging to detect and respond to unauthorized access quickly. Finally, educate users about the risks of sharing links with broad audiences and encourage minimal privilege sharing.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T16:34:59.931Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c2b56bf4197a8e3b4a0825
Added to database: 3/24/2026, 4:01:47 PM
Last enriched: 3/31/2026, 7:51:14 PM
Last updated: 5/7/2026, 8:55:07 PM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.