🔐 CVE Alert

CVE-2026-33316

HIGH 8.1

Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
8th

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, a flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to `StatusActive` after a successful password reset without verifying whether the account was previously disabled. By requesting a reset token through `/api/v1/user/password/token` and completing the reset via `/api/v1/user/password/reset`, a disabled user can reactivate their account and bypass administrator-imposed account disablement. Version 2.2.0 patches the issue.

CWE CWE-284 CWE-862 CWE-863
Vendor go-vikunja
Product vikunja
Published Mar 24, 2026
Last Updated Mar 26, 2026
Stay Ahead of the Next One

Get instant alerts for go-vikunja vikunja

Be the first to know when new high vulnerabilities affecting go-vikunja vikunja are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

go-vikunja / vikunja
< 2.2.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/go-vikunja/vikunja/security/advisories/GHSA-vq4q-79hh-q767 github.com: https://github.com/go-vikunja/vikunja/commit/049f4a6be46f9460bd516f489ef9f569574bc70d github.com: https://github.com/go-vikunja/vikunja/commit/d8570c603da1f26635ce6048d6af85ede827abfb vikunja.io: https://vikunja.io/changelog/vikunja-v2.2.0-was-released