CVE-2026-33678 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: March 25, 2026
Vikunja - Broken Access Control
Overview
Vikunja < 2.2.1 contains a broken access control caused by TaskAttachment.ReadOne() querying attachments by ID without validating task ID, letting authenticated users download or delete any attachment, exploit requires authentication.
Severity & Score
Impact
Authenticated users can access or delete attachments from other projects, leading to unauthorized data access and modification.
Mitigation
Update to version 2.2.1 or later.
References
Social Media Activity(1 post)
š”ļø #Cybersecurity news & tips across the #fediverse āš CVE-2026-33678 - High (8.1) Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id = ?`), ignoring the task ID fro...ā https://mastodon.social/@thehackerwire/116285975900964242 š¤ via RSS feed. Not an endorsement.
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33678
- Severity
- High
- CVSS Score
- 8.1
- Type
- broken_access_control
- Status
- unconfirmed
- EPSS
- 2.8%
- Social Posts
- 1
CWE
- CWE-639
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N