CVE-2026-33473

Vikunja is an open-source self-hosted task management platform. Starting in version 0.13 and prior to version 2.2.1, any user that has enabled 2FA can have their TOTP reused during the standard 30 second validity window. Version 2.2.1 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:*

History

27 Mar 2026, 16:53

Type Values Removed Values Added
References () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-p747-qc5p-773r - () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-p747-qc5p-773r - Exploit, Vendor Advisory
References () https://vikunja.io/changelog/vikunja-v2.2.0-was-released - () https://vikunja.io/changelog/vikunja-v2.2.0-was-released - Release Notes
References () https://vikunja.io/changelog/vikunja-v2.2.2-was-released - () https://vikunja.io/changelog/vikunja-v2.2.2-was-released - Release Notes
First Time Vikunja
Vikunja vikunja
Summary
  • (es) Vikunja es una plataforma de gestión de tareas de código abierto autoalojada. A partir de la versión 0.13 y antes de la versión 2.2.1, cualquier usuario que haya habilitado 2FA puede ver su TOTP reutilizado durante la ventana de validez estándar de 30 segundos. La versión 2.2.1 corrige el problema.
CPE cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo

24 Mar 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-24 16:16

Updated : 2026-03-27 16:53


NVD link : CVE-2026-33473

Mitre link : CVE-2026-33473

CVE.ORG link : CVE-2026-33473


JSON object : View

Products Affected

vikunja

  • vikunja
CWE
CWE-287

Improper Authentication

NVD-CWE-noinfo