CVE-2026-28268

CRITICAL LAB

Vikunja <2.1.0 - Auth Bypass

Title source: llm

Description

Vikunja is an open-source self-hosted task management platform. Versions prior to 2.1.0 have a business logic vulnerability exists in the password reset mechanism of vikunja/api that allows password reset tokens to be reused indefinitely. Due to a failure to invalidate tokens upon use and a critical logic bug in the token cleanup cron job, reset tokens remain valid forever. This allows an attacker who intercepts a single reset token (via logs, browser history, or phishing) to perform a complete, persistent account takeover at any point in the future, bypassing standard authentication controls. Version 2.1.0 contains a patch for the issue.

Exploits (1)

github WORKING POC 1 stars
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2026-28268

Scores

CVSS v3 9.8
EPSS 0.0004
EPSS Percentile 10.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Lab Environment

Lab screenshot
vulnerable
docker pull ghcr.io/exploitintel/cve-2026-28268-vulnerable:latest
All Labs GitHub

Classification

CWE
CWE-459 CWE-640
Status published

Affected Products (2)

code.vikunja.io/api Go
vikunja/vikunja < 2.1.0

Timeline

Published Feb 27, 2026
Tracked Since Feb 28, 2026