CVE-2026-33316
Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, a flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to `StatusActive` after a successful password reset without verifying whether the account was previously disabled. By requesting a reset token through `/api/v1/user/password/token` and completing the reset via `/api/v1/user/password/reset`, a disabled user can reactivate their account and bypass administrator-imposed account disablement. Version 2.2.0 patches the issue.
| CWE | CWE-284 CWE-862 CWE-863 |
| Vendor | go-vikunja |
| Product | vikunja |
| Published | Mar 24, 2026 |
| Last Updated | Mar 26, 2026 |
Get instant alerts for go-vikunja vikunja
Be the first to know when new high vulnerabilities affecting go-vikunja vikunja are published — delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N