CVE-2026-33335
MEDIUM
6,4
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: passive
Confidentiality: N/A
Integrity: N/A
Availability: N/A
Description
AI Translation Available
Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper passes URLs from `window.open()` calls directly to `shell.openExternal()` without any validation or protocol allowlisting. An attacker who can place a link with `target='_blank'` (or that otherwise triggers `window.open`) in user-generated content can cause the victim's operating system to open arbitrary URI schemes, invoking local applications, opening local files, or triggering custom protocol handlers. Version 2.2.0 patches the issue.
939
Improper Authorization in Handler for Custom URL Scheme
IncompleteCommon Consequences
Security Scopes Affected:
Access Control
Other
Potential Impacts:
Gain Privileges Or Assume Identity
Varies By Context
Bypass Protection Mechanism
Applicable Platforms
Technologies:
Mobile
https://github.com/go-vikunja/vikunja/security/advisories/GHSA-6q44-85gc-cjvf
https://vikunja.io/changelog/vikunja-v2.2.0-was-released