CVE-2026-28268Incomplete Cleanup in Vikunja

Severity
9.8CRITICALNVD
EPSS
0.0%
top 88.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 27
Latest updateMar 10

Description

Vikunja is an open-source self-hosted task management platform. Versions prior to 2.1.0 have a business logic vulnerability exists in the password reset mechanism of vikunja/api that allows password reset tokens to be reused indefinitely. Due to a failure to invalidate tokens upon use and a critical logic bug in the token cleanup cron job, reset tokens remain valid forever. This allows an attacker who intercepts a single reset token (via logs, browser history, or phishing) to perform a complete,

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDvikunja/vikunja< 2.1.0
CVEListV5go-vikunja/vikunja< 2.1.0

Patches

🔴Vulnerability Details

3
OSV
Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api2026-03-10
GHSA
Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse2026-02-28
OSV
Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse2026-02-28

🕵️Threat Intelligence

1
Wiz
CVE-2026-28268 Impact, Exploitability, and Mitigation Steps | Wiz