Vikunja is an open-source self-hosted task management platform. Starting in version 0.13 and prior to version 2.2.1, any user that has enabled 2FA can have their TOTP reused during the standard 30 second validity window. Version 2.2.1 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/go-vikunja/vikunja/security/advisories/GHSA-p747-qc5p-773r | Exploit Vendor Advisory |
| https://vikunja.io/changelog/vikunja-v2.2.0-was-released | Release Notes |
| https://vikunja.io/changelog/vikunja-v2.2.2-was-released | Release Notes |
Configurations
History
27 Mar 2026, 16:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-p747-qc5p-773r - Exploit, Vendor Advisory | |
| References | () https://vikunja.io/changelog/vikunja-v2.2.0-was-released - Release Notes | |
| References | () https://vikunja.io/changelog/vikunja-v2.2.2-was-released - Release Notes | |
| First Time |
Vikunja
Vikunja vikunja |
|
| Summary |
|
|
| CPE | cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo |
24 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-24 16:16
Updated : 2026-03-27 16:53
NVD link : CVE-2026-33473
Mitre link : CVE-2026-33473
CVE.ORG link : CVE-2026-33473
JSON object : View
Products Affected
vikunja
- vikunja
CWE
