Vulnerability Description
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, the Caldav endpoint allows login using Basic Authentication, which in turn allows users to bypass the TOTP on 2FA-enabled accounts. The user can then access standard project information that would normally be protected behind 2FA (if enabled), such as project name, description, etc. Version 2.2.0 patches the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vikunja | Vikunja | < 2.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/go-vikunja/vikunja/commit/cdf5d30a425d032f749b78b98b828f25ad8Patch
- https://github.com/go-vikunja/vikunja/security/advisories/GHSA-47cr-f226-r4pqExploitMitigationVendor Advisory
- https://vikunja.io/changelog/vikunja-v2.2.0-was-releasedRelease Notes
FAQ
What is CVE-2026-33315?
CVE-2026-33315 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, the Caldav endpoint allows login using Basic Authentication, which in turn allows users to bypass the TOTP on 2F...
How severe is CVE-2026-33315?
CVE-2026-33315 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33315?
Check the references section above for vendor advisories and patch information. Affected products include: Vikunja Vikunja.