← Back to CVEs
CVE-2026-35594
MEDIUM6.5
Description
Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, Vikunja's link share authentication (GetLinkShareFromClaims in pkg/models/link_sharing.go) constructs authorization objects entirely from JWT claims without any server-side database validation. When a project owner deletes a link share or downgrades its permissions, all previously issued JWTs continue to grant the original permission level for up to 72 hours (the default service.jwtttl). This vulnerability is fixed in 2.3.0.
CVE Details
CVSS v3.1 Score6.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published4/10/2026
Last Modified4/10/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-613
References
https://github.com/go-vikunja/vikunja/commit/379d8a5c19334ffe4846003f590e202c31a75479(security-advisories@github.com)
https://github.com/go-vikunja/vikunja/pull/2581(security-advisories@github.com)
https://github.com/go-vikunja/vikunja/releases/tag/v2.3.0(security-advisories@github.com)
https://github.com/go-vikunja/vikunja/security/advisories/GHSA-96q5-xm3p-7m84(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.