CVE-2026-33316
HIGHVikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement
Title source: cnaDescription
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, a flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to `StatusActive` after a successful password reset without verifying whether the account was previously disabled. By requesting a reset token through `/api/v1/user/password/token` and completing the reset via `/api/v1/user/password/reset`, a disabled user can reactivate their account and bypass administrator-imposed account disablement. Version 2.2.0 patches the issue.
Scores
CVSS v3
8.1
EPSS
0.0004
EPSS Percentile
11.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-284
CWE-862
CWE-863
Status
published
Products (3)
code.vikunja.io/api
0Go
go-vikunja/vikunja
< 2.2.0
vikunja/vikunja
< 2.2.0
Published
Mar 24, 2026
Tracked Since
Mar 24, 2026