Authentication Bypass in Vikunja Task Management Platform by Go Vikunja
CVE-2026-33668

7.1HIGH

Key Information:

Vendor

Go-vikunja

Status
Vendor
CVE Published:
24 March 2026

What is CVE-2026-33668?

Vikunja, an open-source self-hosted task management platform, is susceptible to an authentication bypass vulnerability. This issue arises when user accounts are disabled or locked; current status checks are limited to local login and JWT token refresh processes. Consequently, users with disabled or locked accounts can still access the API and sync data through three other authentication methods — API tokens, CalDAV basic auth, and OpenID Connect. Version 2.2.1 addresses this vulnerability, ensuring that all authentication paths adequately verify user status.

Affected Version(s)

vikunja >= 0.18.0, < 2.2.1

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.