CVE-2026-33700

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the `DELETE /api/v1/projects/:project/shares/:share` endpoint does not verify that the link share belongs to the project specified in the URL. An attacker with admin access to any project can delete link shares from other projects by providing their own project ID combined with the target share ID. Version 2.2.1 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:*

History

30 Mar 2026, 13:35

Type Values Removed Values Added
References () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-f95f-77jx-fcjc - () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-f95f-77jx-fcjc - Vendor Advisory
References () https://vikunja.io/changelog/vikunja-v2.2.2-was-released - () https://vikunja.io/changelog/vikunja-v2.2.2-was-released - Release Notes
CPE cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.9
First Time Vikunja vikunja
Vikunja

Information

Published : 2026-03-24 16:16

Updated : 2026-03-30 13:35


NVD link : CVE-2026-33700

Mitre link : CVE-2026-33700

CVE.ORG link : CVE-2026-33700


JSON object : View

Products Affected

vikunja

  • vikunja
CWE
CWE-639

Authorization Bypass Through User-Controlled Key