CVE-2026-35594

Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, Vikunja's link share authentication (GetLinkShareFromClaims in pkg/models/link_sharing.go) constructs authorization objects entirely from JWT claims without any server-side database validation. When a project owner deletes a link share or downgrades its permissions, all previously issued JWTs continue to grant the original permission level for up to 72 hours (the default service.jwtttl). This vulnerability is fixed in 2.3.0.
Configurations

No configuration.

History

14 Apr 2026, 15:16

Type Values Removed Values Added
References () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-96q5-xm3p-7m84 - () https://github.com/go-vikunja/vikunja/security/advisories/GHSA-96q5-xm3p-7m84 -

10 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 16:16

Updated : 2026-04-14 15:16


NVD link : CVE-2026-35594

Mitre link : CVE-2026-35594

CVE.ORG link : CVE-2026-35594


JSON object : View

Products Affected

No product.

CWE
CWE-613

Insufficient Session Expiration