Vikunja

8 CVEs product

Monthly

CVE-2026-35594 MEDIUM PATCH GHSA This Month

Vikunja prior to version 2.3.0 fails to validate link share permissions against server state during JWT authentication, allowing attackers with revoked or downgraded JWT tokens to maintain the original access level for up to 72 hours. This affects self-hosted task management deployments where link shares are used for collaboration, enabling unauthorized information disclosure and modification of shared projects even after a project owner explicitly revokes or restricts access.

Information Disclosure Vikunja
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-34727 HIGH PATCH GHSA This Week

Authentication bypass in Vikunja task management platform allows unauthenticated attackers to circumvent two-factor authentication when OIDC email-based user matching is enabled. The OIDC callback handler issues complete JWT tokens without validating TOTP enrollment status, enabling full account access to users with configured TOTP protection when matched through OIDC email fallback. Affects versions prior to 2.3.0. No public exploit identified at time of analysis.

Authentication Bypass Vikunja
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-28268 CRITICAL PATCH Act Now

Business logic vulnerability in Vikunja task management platform before 2.1.0 allows incomplete resource cleanup, potentially enabling unauthorized access to shared resources after user removal.

Authentication Bypass Vikunja Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-27819 HIGH POC This Week

Vikunja before version 2.0.0 contains a path traversal vulnerability in its backup restoration function that fails to validate file paths in ZIP archives, allowing attackers with high privileges to write arbitrary files to the host system. Public exploit code exists for this vulnerability, and malformed archives can trigger a denial of service that permanently wipes the database before crashing the application. The flaw affects Vikunja and the underlying Go platform, with no patch currently available.

Golang Denial Of Service Vikunja Suse
NVD GitHub
CVSS 3.1
7.2
EPSS
0.1%
CVE-2026-27616 HIGH POC This Week

Stored cross-site scripting (XSS) in Vikunja prior to version 2.0.0 allows authenticated attackers to steal authentication tokens by uploading malicious SVG files containing JavaScript that executes when accessed directly. The vulnerability exists because the application fails to sanitize SVG content before storage and renders it inline under the application origin, enabling token theft from localStorage. Public exploit code exists for this vulnerability and no patch is currently available for affected versions.

File Upload XSS Vikunja Suse
NVD GitHub
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-27575 CRITICAL POC Act Now

Weak password policy in Vikunja task management before 2.0.0 allows users to set trivially guessable passwords. PoC available.

Information Disclosure Vikunja Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-27116 MEDIUM POC This Month

Vikunja is an open-source self-hosted task management platform. [CVSS 6.1 MEDIUM]

XSS Vikunja Suse
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-25935 MEDIUM PATCH This Month

Cross-site scripting (XSS) in Vikunja prior to version 1.1.0 allows authenticated attackers to execute arbitrary JavaScript in other users' browsers by injecting malicious code into task descriptions that are rendered without sanitization in hover tooltips. An attacker can exploit this by sharing a project and creating a specially crafted task that triggers the vulnerability when other users hover over it. A patch is available in version 1.1.0 and later.

XSS Vikunja Suse
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-35594
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Vikunja prior to version 2.3.0 fails to validate link share permissions against server state during JWT authentication, allowing attackers with revoked or downgraded JWT tokens to maintain the original access level for up to 72 hours. This affects self-hosted task management deployments where link shares are used for collaboration, enabling unauthorized information disclosure and modification of shared projects even after a project owner explicitly revokes or restricts access.

Information Disclosure Vikunja
NVD GitHub
CVE-2026-34727
EPSS 0% CVSS 7.4
HIGH PATCH This Week

Authentication bypass in Vikunja task management platform allows unauthenticated attackers to circumvent two-factor authentication when OIDC email-based user matching is enabled. The OIDC callback handler issues complete JWT tokens without validating TOTP enrollment status, enabling full account access to users with configured TOTP protection when matched through OIDC email fallback. Affects versions prior to 2.3.0. No public exploit identified at time of analysis.

Authentication Bypass Vikunja
NVD GitHub
CVE-2026-28268
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Business logic vulnerability in Vikunja task management platform before 2.1.0 allows incomplete resource cleanup, potentially enabling unauthorized access to shared resources after user removal.

Authentication Bypass Vikunja Suse
NVD GitHub
CVE-2026-27819
EPSS 0% CVSS 7.2
HIGH POC This Week

Vikunja before version 2.0.0 contains a path traversal vulnerability in its backup restoration function that fails to validate file paths in ZIP archives, allowing attackers with high privileges to write arbitrary files to the host system. Public exploit code exists for this vulnerability, and malformed archives can trigger a denial of service that permanently wipes the database before crashing the application. The flaw affects Vikunja and the underlying Go platform, with no patch currently available.

Golang Denial Of Service Vikunja +1
NVD GitHub
CVE-2026-27616
EPSS 0% CVSS 7.3
HIGH POC This Week

Stored cross-site scripting (XSS) in Vikunja prior to version 2.0.0 allows authenticated attackers to steal authentication tokens by uploading malicious SVG files containing JavaScript that executes when accessed directly. The vulnerability exists because the application fails to sanitize SVG content before storage and renders it inline under the application origin, enabling token theft from localStorage. Public exploit code exists for this vulnerability and no patch is currently available for affected versions.

File Upload XSS Vikunja +1
NVD GitHub
CVE-2026-27575
EPSS 0% CVSS 9.1
CRITICAL POC Act Now

Weak password policy in Vikunja task management before 2.0.0 allows users to set trivially guessable passwords. PoC available.

Information Disclosure Vikunja Suse
NVD GitHub
CVE-2026-27116
EPSS 0% CVSS 6.1
MEDIUM POC This Month

Vikunja is an open-source self-hosted task management platform. [CVSS 6.1 MEDIUM]

XSS Vikunja Suse
NVD GitHub
CVE-2026-25935
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Cross-site scripting (XSS) in Vikunja prior to version 1.1.0 allows authenticated attackers to execute arbitrary JavaScript in other users' browsers by injecting malicious code into task descriptions that are rendered without sanitization in hover tooltips. An attacker can exploit this by sharing a project and creating a specially crafted task that triggers the vulnerability when other users hover over it. A patch is available in version 1.1.0 and later.

XSS Vikunja Suse
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy