๐Ÿ” CVE Alert

CVE-2026-27116

MEDIUM 6.1

Vikunja has Reflected HTML Injection via filter Parameter in Projects Module

CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
0th

Vikunja is an open-source self-hosted task management platform. Prior to version 2.0.0, a reflected HTML injection vulnerability exists in the Projects module where the `filter` URL parameter is rendered into the DOM without output encoding when the user clicks "Filter." While `<script>` and `<iframe>` are blocked, `<svg>`, `<a>`, and formatting tags (`<h1>`, `<b>`, `<u>`) render without restriction โ€” enabling SVG-based phishing buttons, external redirect links, and content spoofing within the trusted application origin. Version 2.0.0 fixes this issue.

CWE CWE-79 CWE-80
Vendor go-vikunja
Product vikunja
Published Feb 25, 2026
Last Updated Feb 25, 2026
Stay Ahead of the Next One

Get instant alerts for go-vikunja vikunja

Be the first to know when new medium vulnerabilities affecting go-vikunja vikunja are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

go-vikunja / vikunja
< 2.0.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/go-vikunja/vikunja/security/advisories/GHSA-4qgr-4h56-8895 vikunja.io: https://vikunja.io/changelog/vikunja-v2.0.0-was-released