CVE-2026-28268
Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse
Vikunja is an open-source self-hosted task management platform. Versions prior to 2.1.0 have a business logic vulnerability exists in the password reset mechanism of vikunja/api that allows password reset tokens to be reused indefinitely. Due to a failure to invalidate tokens upon use and a critical logic bug in the token cleanup cron job, reset tokens remain valid forever. This allows an attacker who intercepts a single reset token (via logs, browser history, or phishing) to perform a complete, persistent account takeover at any point in the future, bypassing standard authentication controls. Version 2.1.0 contains a patch for the issue.
| CWE | CWE-459 CWE-640 |
| Vendor | go-vikunja |
| Product | vikunja |
| Published | Feb 27, 2026 |
| Last Updated | Mar 3, 2026 |
Get instant alerts for go-vikunja vikunja
Be the first to know when new critical vulnerabilities affecting go-vikunja vikunja are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H