CVE-2026-33678

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id = ?`), ignoring the task ID from the URL path. The permission check in `CanRead()` validates access to the task specified in the URL, but `ReadOne()` loads a different attachment that may belong to a task in another project. This allows any authenticated user to download or delete any attachment in the system by providing their own accessible task ID with a target attachment ID. Attachment IDs are sequential integers, making enumeration trivial. Version 2.2.1 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:*

History

30 Mar 2026, 13:57

Type Values Removed Values Added
CPE cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:*
References () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-jfmm-mjcp-8wq2 - () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-jfmm-mjcp-8wq2 - Exploit, Vendor Advisory
References () https://vikunja.io/changelog/vikunja-v2.2.2-was-released - () https://vikunja.io/changelog/vikunja-v2.2.2-was-released - Release Notes
First Time Vikunja vikunja
Vikunja

Information

Published : 2026-03-24 16:16

Updated : 2026-03-30 13:57


NVD link : CVE-2026-33678

Mitre link : CVE-2026-33678

CVE.ORG link : CVE-2026-33678


JSON object : View

Products Affected

vikunja

  • vikunja
CWE
CWE-639

Authorization Bypass Through User-Controlled Key