Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the `DELETE /api/v1/projects/:project/shares/:share` endpoint does not verify that the link share belongs to the project specified in the URL. An attacker with admin access to any project can delete link shares from other projects by providing their own project ID combined with the target share ID. Version 2.2.1 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/go-vikunja/vikunja/security/advisories/GHSA-f95f-77jx-fcjc | Vendor Advisory |
| https://vikunja.io/changelog/vikunja-v2.2.2-was-released | Release Notes |
Configurations
History
30 Mar 2026, 13:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-f95f-77jx-fcjc - Vendor Advisory | |
| References | () https://vikunja.io/changelog/vikunja-v2.2.2-was-released - Release Notes | |
| CPE | cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.9 |
| First Time |
Vikunja vikunja
Vikunja |
Information
Published : 2026-03-24 16:16
Updated : 2026-03-30 13:35
NVD link : CVE-2026-33700
Mitre link : CVE-2026-33700
CVE.ORG link : CVE-2026-33700
JSON object : View
Products Affected
vikunja
- vikunja
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
