CVE-2026-33679

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the `DownloadImage` function in `pkg/utils/avatar.go` uses a bare `http.Client{}` with no SSRF protection when downloading user avatar images from the OpenID Connect `picture` claim URL. An attacker who controls their OIDC profile picture URL can force the Vikunja server to make HTTP GET requests to arbitrary internal or cloud metadata endpoints. This bypasses the SSRF protections that are correctly applied to the webhook system. Version 2.2.1 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:*

History

30 Mar 2026, 13:56

Type Values Removed Values Added
First Time Vikunja vikunja
Vikunja
CPE cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:*
References () https://github.com/go-vikunja/vikunja/commit/363aa6642352b08fc8bc6aaff2f3a550393af1cf - () https://github.com/go-vikunja/vikunja/commit/363aa6642352b08fc8bc6aaff2f3a550393af1cf - Patch
References () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-g9xj-752q-xh63 - () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-g9xj-752q-xh63 - Exploit, Vendor Advisory
References () https://vikunja.io/changelog/vikunja-v2.2.2-was-released - () https://vikunja.io/changelog/vikunja-v2.2.2-was-released - Release Notes

Information

Published : 2026-03-24 16:16

Updated : 2026-03-30 13:56


NVD link : CVE-2026-33679

Mitre link : CVE-2026-33679

CVE.ORG link : CVE-2026-33679


JSON object : View

Products Affected

vikunja

  • vikunja
CWE
CWE-918

Server-Side Request Forgery (SSRF)