LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-33316

CVE-2026-33316 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: March 24, 2026

Vikunja - Authentication Bypass

Published: March 24, 2026Updated: March 24, 2026PoC AvailableRemote Exploitable

Overview

Vikunja < 2.2.0 contains an authentication bypass caused by improper status verification in ResetPassword() function, letting disabled users reactivate accounts and bypass admin disablement, exploit requires disabled user account.

Severity & Score

Severity: High
CVSS Score: 8.1
EPSS Score: 2.9%(Probability of exploitation in next 30 days)

Impact

Disabled users can regain access by resetting passwords, bypassing administrator account disablement controls.

Mitigation

Upgrade to version 2.2.0 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 24, 2026

🟠 CVE-2026-33316 - High (8.1) Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, a flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to... 🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33316/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-33316
Severity
High
CVSS Score
8.1
Type
broken_authentication
Status
confirmed
EPSS
2.9%
Social Posts
1

CWE

  • CWE-284

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS Score

2.9%Probability of exploitation in the next 30 days