Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, the Caldav endpoint allows login using Basic Authentication, which in turn allows users to bypass the TOTP on 2FA-enabled accounts. The user can then access standard project information that would normally be protected behind 2FA (if enabled), such as project name, description, etc. Version 2.2.0 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/go-vikunja/vikunja/commit/cdf5d30a425d032f749b78b98b828f25ad882615 | Patch |
| https://github.com/go-vikunja/vikunja/security/advisories/GHSA-47cr-f226-r4pq | Exploit Mitigation Vendor Advisory |
| https://vikunja.io/changelog/vikunja-v2.2.0-was-released | Release Notes |
Configurations
History
No history.
Information
Published : 2026-03-24 15:16
Updated : 2026-03-24 19:21
NVD link : CVE-2026-33315
Mitre link : CVE-2026-33315
CVE.ORG link : CVE-2026-33315
JSON object : View
Products Affected
vikunja
- vikunja
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
