Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33680: CWE-285: Improper Authorization in go-vikunja vikunja

0
High
VulnerabilityCVE-2026-33680cvecve-2026-33680cwe-285
Published: Tue Mar 24 2026 (03/24/2026, 15:47:47 UTC)
Source: CVE Database V5
Vendor/Project: go-vikunja
Product: vikunja

Description

CVE-2026-33680 is a high-severity improper authorization vulnerability in the open-source task management platform Vikunja versions prior to 2. 2. 2. The flaw exists in the LinkSharing. ReadAll() method, which allows authenticated users with read-only link shares to list all link shares for a project, including secret hashes of write and admin shares. This occurs because the ReadAllWeb handler bypasses the CanRead() authorization check, enabling attackers to escalate privileges from read-only to full admin access without authentication or user interaction. The vulnerability impacts confidentiality by exposing secret hashes but does not affect integrity or availability directly. The issue is patched in Vikunja version 2. 2. 2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 16:16:14 UTC

Technical Analysis

Vikunja is an open-source, self-hosted task management platform that supports link sharing with different permission levels. In versions prior to 2.2.2, a critical authorization flaw exists in the LinkSharing.ReadAll() method. Specifically, the ReadAllWeb HTTP handler allows authenticated users possessing a read-only link share to retrieve a list of all link shares associated with a project, including secret hashes for shares with write or admin privileges. Although the system correctly restricts reading individual shares via the ReadOne method using the CanRead() authorization check, the ReadAllWeb handler does not invoke this check, effectively bypassing it. This design flaw enables an attacker to obtain secret hashes of higher privilege shares and use them to authenticate as a write or admin user, thereby escalating their privileges to full administrative control over the project. The vulnerability does not require prior authentication beyond possessing a read-only link share and does not require user interaction, making exploitation straightforward. The vulnerability is tracked as CWE-285 (Improper Authorization) and has a CVSS 3.1 base score of 7.5, reflecting high severity. The issue was publicly disclosed on March 24, 2026, and fixed in Vikunja version 2.2.2. No known exploits in the wild have been reported yet.

Potential Impact

This vulnerability allows attackers with minimal access—a read-only link share—to escalate their privileges to full admin rights on a project. The impact is significant for organizations using Vikunja versions prior to 2.2.2, as attackers can gain unauthorized access to sensitive project data, modify tasks, change configurations, or delete content, potentially disrupting project workflows and compromising confidentiality. Since Vikunja is self-hosted, the risk is concentrated on organizations that deploy it internally or expose it externally. The exposure of secret hashes undermines the security model of link sharing, enabling lateral privilege escalation within the same project. Although availability and integrity impacts are indirect, the ability to gain admin access can lead to data tampering or denial of service through administrative actions. The vulnerability's ease of exploitation and lack of required user interaction increase the risk of rapid compromise once discovered.

Mitigation Recommendations

Organizations should immediately upgrade Vikunja to version 2.2.2 or later, where the authorization bypass in the ReadAllWeb handler is patched. Until upgrading, administrators should restrict access to link shares, especially read-only links, and monitor usage for suspicious activity. Implement network-level controls to limit access to the Vikunja instance to trusted users and networks. Review and audit existing link shares for unnecessary privileges and revoke any that are not essential. Consider disabling link sharing temporarily if feasible. Additionally, implement logging and alerting on access to link shares and administrative actions to detect potential exploitation attempts. Educate users about the risks of sharing links broadly. Finally, maintain regular backups of project data to recover from potential compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T16:34:59.931Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2b56bf4197a8e3b4a0825

Added to database: 3/24/2026, 4:01:47 PM

Last enriched: 3/24/2026, 4:16:14 PM

Last updated: 3/24/2026, 5:11:33 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses