CVE-2026-33316

HIGH

Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement

Title source: cna
STIX 2.1

Description

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, a flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to `StatusActive` after a successful password reset without verifying whether the account was previously disabled. By requesting a reset token through `/api/v1/user/password/token` and completing the reset via `/api/v1/user/password/reset`, a disabled user can reactivate their account and bypass administrator-imposed account disablement. Version 2.2.0 patches the issue.

Scores

CVSS v3 8.1
EPSS 0.0004
EPSS Percentile 11.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-284 CWE-862 CWE-863
Status published
Products (3)
code.vikunja.io/api 0Go
go-vikunja/vikunja < 2.2.0
vikunja/vikunja < 2.2.0
Published Mar 24, 2026
Tracked Since Mar 24, 2026