Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the `DownloadImage` function in `pkg/utils/avatar.go` uses a bare `http.Client{}` with no SSRF protection when downloading user avatar images from the OpenID Connect `picture` claim URL. An attacker who controls their OIDC profile picture URL can force the Vikunja server to make HTTP GET requests to arbitrary internal or cloud metadata endpoints. This bypasses the SSRF protections that are correctly applied to the webhook system. Version 2.2.1 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/go-vikunja/vikunja/commit/363aa6642352b08fc8bc6aaff2f3a550393af1cf | Patch |
| https://github.com/go-vikunja/vikunja/security/advisories/GHSA-g9xj-752q-xh63 | Exploit Vendor Advisory |
| https://vikunja.io/changelog/vikunja-v2.2.2-was-released | Release Notes |
Configurations
History
30 Mar 2026, 13:56
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Vikunja vikunja
Vikunja |
|
| CPE | cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:* | |
| References | () https://github.com/go-vikunja/vikunja/commit/363aa6642352b08fc8bc6aaff2f3a550393af1cf - Patch | |
| References | () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-g9xj-752q-xh63 - Exploit, Vendor Advisory | |
| References | () https://vikunja.io/changelog/vikunja-v2.2.2-was-released - Release Notes |
Information
Published : 2026-03-24 16:16
Updated : 2026-03-30 13:56
NVD link : CVE-2026-33679
Mitre link : CVE-2026-33679
CVE.ORG link : CVE-2026-33679
JSON object : View
Products Affected
vikunja
- vikunja
CWE
CWE-918
Server-Side Request Forgery (SSRF)
