CVE-2026-33315
MEDIUM
6,9
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
Description
AI Translation Available
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, the Caldav endpoint allows login using Basic Authentication, which in turn allows users to bypass the TOTP on 2FA-enabled accounts. The user can then access standard project information that would normally be protected behind 2FA (if enabled), such as project name, description, etc. Version 2.2.0 patches the issue.
288
Authentication Bypass Using an Alternate Path or Channel
IncompleteCommon Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Bypass Protection Mechanism
Applicable Platforms
Technologies:
Not Technology-Specific, Web Based
https://github.com/go-vikunja/vikunja/commit/cdf5d30a425d032f749b78b98b828f25ad…
https://github.com/go-vikunja/vikunja/security/advisories/GHSA-47cr-f226-r4pq
https://vikunja.io/changelog/vikunja-v2.2.0-was-released