CVE-2026-33675

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the migration helper functions `DownloadFile` and `DownloadFileWithHeaders` in `pkg/modules/migration/helpers.go` make arbitrary HTTP GET requests without any SSRF protection. When a user triggers a Todoist or Trello migration, file attachment URLs from the third-party API response are passed directly to these functions, allowing an attacker to force the Vikunja server to fetch internal network resources and return the response as a downloadable task attachment. Version 2.2.1 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-24 16:16

Updated : 2026-03-27 16:20


NVD link : CVE-2026-33675

Mitre link : CVE-2026-33675

CVE.ORG link : CVE-2026-33675


JSON object : View

Products Affected

vikunja

  • vikunja
CWE
CWE-918

Server-Side Request Forgery (SSRF)