๐Ÿ” CVE Alert

CVE-2026-33679

MEDIUM 6.4

Vikunja has SSRF via OpenID Connect Avatar Download that Bypasses Webhook SSRF Protections

CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the `DownloadImage` function in `pkg/utils/avatar.go` uses a bare `http.Client{}` with no SSRF protection when downloading user avatar images from the OpenID Connect `picture` claim URL. An attacker who controls their OIDC profile picture URL can force the Vikunja server to make HTTP GET requests to arbitrary internal or cloud metadata endpoints. This bypasses the SSRF protections that are correctly applied to the webhook system. Version 2.2.1 patches the issue.

CWE CWE-918
Vendor go-vikunja
Product vikunja
Published Mar 24, 2026
Last Updated Mar 24, 2026
Stay Ahead of the Next One

Get instant alerts for go-vikunja vikunja

Be the first to know when new medium vulnerabilities affecting go-vikunja vikunja are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
Low

Affected Versions

go-vikunja / vikunja
< 2.2.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/go-vikunja/vikunja/security/advisories/GHSA-g9xj-752q-xh63 github.com: https://github.com/go-vikunja/vikunja/commit/363aa6642352b08fc8bc6aaff2f3a550393af1cf vikunja.io: https://vikunja.io/changelog/vikunja-v2.2.2-was-released