File Overwrite Vulnerability in Vikunja Task Management Platform
CVE-2026-27819

7.2HIGH

Key Information:

Vendor

Go-vikunja

Status
Vendor
CVE Published:
25 February 2026

What is CVE-2026-27819?

Vikunja, an open-source self-hosted task management platform, has a security flaw in the restoreConfig function that fails to properly sanitize file paths within the provided ZIP archives, allowing malicious actors to bypass the intended extraction directory. This oversight can lead to arbitrary file overwrites on the host system. Furthermore, a specially crafted ZIP can trigger a runtime panic, causing the application to crash immediately after potentially wiping the database. The vulnerability arises because the application trusts file metadata in the ZIP archive and does not validate the extraction paths appropriately. This issue was rectified in version 2.0.0.

Affected Version(s)

vikunja < 2.0.0

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.