Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33700: CWE-639: Authorization Bypass Through User-Controlled Key in go-vikunja vikunja

0
Medium
VulnerabilityCVE-2026-33700cvecve-2026-33700cwe-639
Published: Tue Mar 24 2026 (03/24/2026, 15:51:40 UTC)
Source: CVE Database V5
Vendor/Project: go-vikunja
Product: vikunja

Description

CVE-2026-33700 is an authorization bypass vulnerability in the open-source task management platform Vikunja prior to version 2. 2. 1. The flaw exists in the DELETE /api/v1/projects/:project/shares/:share endpoint, which fails to verify that a link share belongs to the specified project. An attacker with admin access to any project can exploit this by deleting link shares from other projects by manipulating the project ID and share ID parameters. This vulnerability does not require user interaction but does require administrative privileges on at least one project. The issue was patched in version 2. 2. 1. The CVSS 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 16:17:25 UTC

Technical Analysis

Vikunja is an open-source, self-hosted task management platform that allows users to manage projects and share links associated with those projects. The vulnerability identified as CVE-2026-33700 (CWE-639: Authorization Bypass Through User-Controlled Key) affects versions of Vikunja prior to 2.2.1. Specifically, the DELETE endpoint at /api/v1/projects/:project/shares/:share does not properly verify that the link share being deleted actually belongs to the project specified in the URL path. This improper authorization check allows an attacker who has administrative access to any single project within the Vikunja instance to delete link shares from other projects by supplying their own project ID combined with the target share ID from another project. The vulnerability arises because the server trusts the project ID parameter without cross-checking ownership of the share resource, leading to an authorization bypass. Exploitation requires the attacker to have admin privileges on at least one project, but no further user interaction or authentication bypass is needed. The flaw impacts the integrity of project data by enabling unauthorized deletion of shares, potentially disrupting collaboration and causing data loss. The issue was addressed and fixed in Vikunja version 2.2.1 by adding proper authorization checks to ensure that the share belongs to the project before allowing deletion. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no user interaction, but requiring high privileges (admin on a project), with a medium severity score of 6.9.

Potential Impact

The primary impact of this vulnerability is unauthorized deletion of link shares across projects within a Vikunja instance. This can lead to data integrity issues, loss of shared resources, and disruption of team collaboration workflows. Since the attacker must have admin access to at least one project, the scope is limited to insiders or compromised accounts with elevated privileges. However, in environments where multiple projects are managed by different teams or clients on the same Vikunja instance, this flaw could allow an attacker to interfere with other teams’ data, potentially causing operational disruption and loss of trust. The vulnerability does not allow full project deletion or access to confidential data but undermines the integrity and availability of shared links. Organizations relying on Vikunja for task and project management, especially those with multi-tenant or multi-team deployments, are at risk of internal sabotage or privilege abuse. The lack of known exploits in the wild reduces immediate risk, but the vulnerability’s presence in a network-accessible API endpoint means it could be targeted by malicious insiders or attackers who have gained partial access.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade all Vikunja instances to version 2.2.1 or later, where the authorization checks have been properly implemented. Until the upgrade is applied, administrators should restrict project admin privileges to trusted users only and monitor for suspicious deletion activity of link shares. Implementing strong access controls and auditing on project admin roles can reduce the risk of exploitation. Additionally, network segmentation and limiting API access to trusted networks or VPNs can reduce exposure. Regularly reviewing logs for anomalous API calls to the DELETE /api/v1/projects/:project/shares/:share endpoint can help detect attempts to exploit this flaw. For organizations running multi-tenant Vikunja instances, consider isolating projects or using separate instances to minimize cross-project privilege abuse. Finally, maintain an up-to-date inventory of Vikunja versions deployed and ensure timely patch management processes are in place.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T17:06:05.746Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2b56bf4197a8e3b4a082a

Added to database: 3/24/2026, 4:01:47 PM

Last enriched: 3/24/2026, 4:17:25 PM

Last updated: 3/24/2026, 5:10:15 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses