Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, Vikunja's link share authentication (GetLinkShareFromClaims in pkg/models/link_sharing.go) constructs authorization objects entirely from JWT claims without any server-side database validation. When a project owner deletes a link share or downgrades its permissions, all previously issued JWTs continue to grant the original permission level for up to 72 hours (the default service.jwtttl). This vulnerability is fixed in 2.3.0.
References
Configurations
No configuration.
History
14 Apr 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-96q5-xm3p-7m84 - |
10 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 16:16
Updated : 2026-04-14 15:16
NVD link : CVE-2026-35594
Mitre link : CVE-2026-35594
CVE.ORG link : CVE-2026-35594
JSON object : View
Products Affected
No product.
CWE
CWE-613
Insufficient Session Expiration
