CVE-2026-33680Improper Authorization in Vikunja

Severity
6.5MEDIUMNVD
EPSS
0.0%
top 89.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 24
Latest updateMar 26

Description

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.2, the `LinkSharing.ReadAll()` method allows link share authenticated users to list all link shares for a project, including their secret hashes. While `LinkSharing.CanRead()` correctly blocks link share users from reading individual shares via `ReadOne`, the `ReadAllWeb` handler bypasses this check by never calling `CanRead()`. An attacker with a read-only link share can retrieve hashes for write or admin link

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

NVDvikunja/vikunja< 2.2.2
CVEListV5go-vikunja/vikunja< 2.2.2

Patches

🔴Vulnerability Details

3
OSV
Vikjuna: Link Share Hash Disclosure via ReadAll Endpoint Enables Permission Escalation in code.vikunja.io/api2026-03-26
GHSA
Vikjuna: Link Share Hash Disclosure via ReadAll Endpoint Enables Permission Escalation2026-03-25
OSV
Vikjuna: Link Share Hash Disclosure via ReadAll Endpoint Enables Permission Escalation2026-03-25

🕵️Threat Intelligence

1
Wiz
CVE-2026-33680 Impact, Exploitability, and Mitigation Steps | Wiz