CVE-2026-27575 - Vulnerability Analysis
CriticalCVSS: 9.1Last Updated: February 27, 2026
Vikunja - Authentication Bypass
Overview
Vikunja < 2.0.0 contains a broken authentication caused by weak password enforcement and persistent active sessions after password change, letting attackers maintain access after password reset, exploit requires compromised user account.
Severity & Score
Impact
Attackers can maintain persistent access to user accounts even after password resets, leading to prolonged unauthorized access.
Mitigation
Update to version 2.0.0 or later.
References
Social Media Activity(1 post)
š“ CVE-2026-27575 - Critical (9.1) Vikunja is an open-source self-hosted task management platform. Prior to version 2.0.0, the application allows users to set weak passwords (e.g., 1234, password) without enforcing minimum strength requirements. Additionally, active sessions remain... š https://www.thehackerwire.com/vulnerability/CVE-2026-27575/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-27575
- Severity
- Critical
- CVSS Score
- 9.1
- Type
- broken_authentication
- Status
- unconfirmed
- EPSS
- 1.1%
- Social Posts
- 1
CWE
- CWE-521
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N