← Zuruck zu CVEs
CVE-2026-33679
MEDIUM6.4
Beschreibung
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the `DownloadImage` function in `pkg/utils/avatar.go` uses a bare `http.Client{}` with no SSRF protection when downloading user avatar images from the OpenID Connect `picture` claim URL. An attacker who controls their OIDC profile picture URL can force the Vikunja server to make HTTP GET requests to arbitrary internal or cloud metadata endpoints. This bypasses the SSRF protections that are correctly applied to the webhook system. Version 2.2.1 patches the issue.
CVE Details
CVSS v3.1 Bewertung6.4
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht3/24/2026
Zuletzt geandert3/30/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
vikunja:vikunja
Schwachen (CWE)
CWE-918
Referenzen
https://github.com/go-vikunja/vikunja/commit/363aa6642352b08fc8bc6aaff2f3a550393af1cf(security-advisories@github.com)
https://github.com/go-vikunja/vikunja/security/advisories/GHSA-g9xj-752q-xh63(security-advisories@github.com)
https://vikunja.io/changelog/vikunja-v2.2.2-was-released(security-advisories@github.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.