Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, the Caldav endpoint allows login using Basic Authentication, which in turn allows users to bypass the TOTP on 2FA-enabled accounts. The user can then access standard project information that would normally be protected behind 2FA (if enabled), such as project name, description, etc. Version 2.2.0 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/go-vikunja/vikunja/commit/cdf5d30a425d032f749b78b98b828f25ad882615 | Patch |
| https://github.com/go-vikunja/vikunja/security/advisories/GHSA-47cr-f226-r4pq | Exploit Mitigation Vendor Advisory |
| https://vikunja.io/changelog/vikunja-v2.2.0-was-released | Release Notes |
Configurations
History
24 Mar 2026, 19:21
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:* | |
| First Time |
Vikunja
Vikunja vikunja |
|
| References | () https://github.com/go-vikunja/vikunja/commit/cdf5d30a425d032f749b78b98b828f25ad882615 - Patch | |
| References | () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-47cr-f226-r4pq - Exploit, Mitigation, Vendor Advisory | |
| References | () https://vikunja.io/changelog/vikunja-v2.2.0-was-released - Release Notes | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
24 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
24 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-24 15:16
Updated : 2026-03-24 19:21
NVD link : CVE-2026-33315
Mitre link : CVE-2026-33315
CVE.ORG link : CVE-2026-33315
JSON object : View
Products Affected
vikunja
- vikunja
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
