DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

CVE-2026-33680: CVE-2026-33680: Permission Escalation via Link Share Hash Disclosure in Vikunja

CVE-2026-33680: Permission Escalation via Link Share Hash Disclosure in Vikunja

Vulnerability ID: CVE-2026-33680
CVSS Score: 7.5
Published: 2026-03-25

Vikunja versions prior to 2.2.2 suffer from an improper authorization vulnerability in the link-sharing mechanism. The ReadAll API endpoint fails to validate permissions correctly, allowing an attacker with a read-only link share to extract authentication hashes for administrative shares. This flaw enables unauthenticated or low-privilege actors to escalate their access to full administrative control over a target project.

TL;DR

Improper authorization in Vikunja's link-sharing API exposes admin hashes to read-only users, leading to full project takeover.


⚠️ Exploit Status: POC

Technical Details

  • CWE ID: CWE-285
  • CVSS v3.1: 7.5 (High)
  • Attack Vector: Network
  • Impact: High (Confidentiality, Integrity, Availability via Admin Escalation)
  • Exploit Status: Proof-of-Concept (PoC) available
  • EPSS Score: 0.03% (Percentile: 8.51%)

Affected Systems

  • Vikunja open-source task management platform
  • Vikunja: < 2.2.2

Code Analysis

Commit: 9efe1fa

Block link share users from ReadAll

Commit: 5cd5dc4

Require admin access to list link shares

Commit: 74d1bdd

Frontend Mitigation: Modify UI to hide link sharing management

Mitigation Strategies

  • Upgrade Vikunja to version 2.2.2 or later.
  • Audit existing project link shares for unauthorized access or modification.
  • Revoke and regenerate any previously exposed link share hashes.

Remediation Steps:

  1. Download the latest Vikunja release (2.2.2+).
  2. Backup the current database and configuration.
  3. Deploy the updated binary/container image.
  4. Restart the Vikunja service.
  5. Verify that low-privilege users can no longer access the /api/v1/projects//shares endpoint.

References


Read the full report for CVE-2026-33680 on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)