CVE-2026-33675: Server-Side Request Forgery (SSRF) in Vikunja Task Migration
Vulnerability ID: CVE-2026-33675
CVSS Score: 6.4
Published: 2026-03-25
A Server-Side Request Forgery (SSRF) vulnerability in Vikunja versions prior to 2.2.1 allows authenticated users to exfiltrate internal network resources during task migration operations.
TL;DR
Vikunja < 2.2.1 contains an SSRF flaw in its migration module due to unvalidated third-party URLs. Authenticated attackers can exploit this to read internal network data, such as cloud metadata services. The issue is resolved in version 2.2.2 via a centralized SSRF-safe HTTP client.
Technical Details
- CWE ID: CWE-918
- Attack Vector: Network
- CVSS v3.1: 6.4 (Medium)
- EPSS Score: 0.00034 (0.03%)
- Impact: Information Disclosure, Internal Reconnaissance
- Exploit Status: No known public exploits (None)
- Authentication: Required (Low Privileges)
Affected Systems
- Vikunja self-hosted task management platform
-
Vikunja: < 2.2.1 (Fixed in:
2.2.1)
Code Analysis
Commit: 9329774
Replace default http.Client with SSRF-safe client in migration helpers
- hc := http.Client{}
- resp, err := hc.Do(req) // #nosec G704 -- URL is from migration provider API
+ hc := utils.NewSSRFSafeHTTPClient()
+ resp, err := hc.Do(req)
Mitigation Strategies
- Upgrade Vikunja to version 2.2.2 or later
- Ensure OutgoingRequestsAllowNonRoutableIPs is set to false in config.yml
- Implement network egress filtering to block access to 169.254.169.254 and private IP ranges
Remediation Steps:
- Download the latest Vikunja release (v2.2.2+) from the official repository.
- Apply the update to the application server following the standard upgrade procedure.
- Review config.yml and locate the 'outgoingrequests' block.
- Verify that 'OutgoingRequestsAllowNonRoutableIPs' is explicitly false.
- Restart the Vikunja service to apply the configuration changes.
References
- GitHub Security Advisory GHSA-g66v-54v9-52pr
- Fix Commit 93297742236e3d33af72c993e5da960db01d259e
- Vikunja v2.2.2 Release Changelog
- CVE-2026-33675 Record
Read the full report for CVE-2026-33675 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)