Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-33678

Publication date:
24/03/2026
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id = ?`), ignoring the task ID from the URL path. The permission check in `CanRead()` validates access to the task specified in the URL, but `ReadOne()` loads a different attachment that may belong to a task in another project. This allows any authenticated user to download or delete any attachment in the system by providing their own accessible task ID with a target attachment ID. Attachment IDs are sequential integers, making enumeration trivial. Version 2.2.1 patches the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2026

CVE-2026-33668

Publication date:
24/03/2026
Vikunja is an open-source self-hosted task management platform. Starting in version 0.18.0 and prior to version 2.2.1, when a user account is disabled or locked, the status check is only enforced on the local login and JWT token refresh paths. Three other authentication paths — API tokens, CalDAV basic auth, and OpenID Connect — do not verify user status, allowing disabled or locked users to continue accessing the API and syncing data. Version 2.2.1 patches the issue.
Severity CVSS v4.0: HIGH
Last modification:
27/03/2026

CVE-2026-33675

Publication date:
24/03/2026
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the migration helper functions `DownloadFile` and `DownloadFileWithHeaders` in `pkg/modules/migration/helpers.go` make arbitrary HTTP GET requests without any SSRF protection. When a user triggers a Todoist or Trello migration, file attachment URLs from the third-party API response are passed directly to these functions, allowing an attacker to force the Vikunja server to fetch internal network resources and return the response as a downloadable task attachment. Version 2.2.1 patches the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2026

CVE-2026-33676

Publication date:
24/03/2026
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, when the Vikunja API returns tasks, it populates the `related_tasks` field with full task objects for all related tasks without checking whether the requesting user has read permission on those tasks' projects. An authenticated user who can read a task that has cross-project relations will receive full details (title, description, due dates, priority, percent completion, project ID, etc.) of tasks in projects they have no access to. Version 2.2.1 patches the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2026

CVE-2026-33334

Publication date:
24/03/2026
Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper enables `nodeIntegration` in the renderer process without `contextIsolation` or `sandbox`. This means any cross-site scripting (XSS) vulnerability in the Vikunja web frontend -- present or future -- automatically escalates to full remote code execution on the victim's machine, as injected scripts gain access to Node.js APIs. Version 2.2.0 fixes the issue.
Severity CVSS v4.0: MEDIUM
Last modification:
27/03/2026

CVE-2026-33335

Publication date:
24/03/2026
Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper passes URLs from `window.open()` calls directly to `shell.openExternal()` without any validation or protocol allowlisting. An attacker who can place a link with `target="_blank"` (or that otherwise triggers `window.open`) in user-generated content can cause the victim's operating system to open arbitrary URI schemes, invoking local applications, opening local files, or triggering custom protocol handlers. Version 2.2.0 patches the issue.
Severity CVSS v4.0: MEDIUM
Last modification:
27/03/2026

CVE-2026-33336

Publication date:
24/03/2026
Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper enables `nodeIntegration` in the main BrowserWindow and does not restrict same-window navigations. An attacker who can place a link in user-generated content (task descriptions, comments, project descriptions) can cause the BrowserWindow to navigate to an attacker-controlled origin, where JavaScript executes with full Node.js access, resulting in arbitrary code execution on the victim&amp;#39;s machine. Version 2.2.0 patches the issue.<br /> <br /> ## Root cause<br /> <br /> Two misconfigurations combine to create this vulnerability:<br /> <br /> 1. **`nodeIntegration: true`** is set in `BrowserWindow` web preferences (`desktop/main.js:14-16`), giving any page loaded in the renderer full access to Node.js APIs (`require`, `child_process`, `fs`, etc.).<br /> <br /> 2. **No `will-navigate` or `will-redirect` handler** is registered on the `webContents`. The existing `setWindowOpenHandler` (`desktop/main.js:19-23`) only intercepts `window.open()` calls (new-window requests). It does **not** intercept same-window navigations triggered by:<br /> - `` links (without `target="_blank"`)<br /> - `window.location` assignments<br /> - HTTP redirects<br /> - `` tags<br /> <br /> ## Attack scenario<br /> <br /> 1. The attacker is a normal user on the same Vikunja instance (e.g., a member of a shared project).<br /> 2. The attacker creates or edits a project description or task description containing a standard HTML link, e.g.: `Click here for the updated design spec`<br /> 3. The Vikunja frontend renders this link. DOMPurify sanitization correctly allows it -- it is a legitimate anchor tag, not a script injection. Render path example: `frontend/src/views/project/ProjectInfo.vue` uses `v-html` with DOMPurify-sanitized output.<br /> 4. The victim uses Vikunja Desktop and clicks the link.<br /> 5. Because no `will-navigate` handler exists, the BrowserWindow navigates to `https://evil.example/exploit` in the same renderer process.<br /> 6. The attacker&amp;#39;s page now executes in a context with `nodeIntegration: true` and runs: `require(&amp;#39;child_process&amp;#39;).exec(&amp;#39;id &gt; /tmp/pwned&amp;#39;);`<br /> 7. Arbitrary commands execute as the victim&amp;#39;s OS user.<br /> <br /> ## Impact<br /> <br /> Full remote code execution on the victim&amp;#39;s desktop. The attacker can read/write arbitrary files, execute arbitrary commands, install malware or backdoors, and exfiltrate credentials and sensitive data. No XSS vulnerability is required -- a normal, sanitizer-approved hyperlink is sufficient.<br /> <br /> ## Proof of concept<br /> <br /> 1. Set up a Vikunja instance with two users sharing a project.<br /> 2. As the attacker user, edit a project description to include: `Meeting notes`<br /> 3. Host poc.html with: `require(&amp;#39;child_process&amp;#39;).exec(&amp;#39;calc.exe&amp;#39;)`<br /> 4. As the victim, open the project in Vikunja Desktop and click the link.<br /> 5. calc.exe (or any other command) executes on the victim&amp;#39;s machine.<br /> <br /> ## Credits<br /> <br /> This vulnerability was found using [GitHub Security Lab Taskflows](https://github.com/GitHubSecurityLab/seclab-taskflows).
Severity CVSS v4.0: MEDIUM
Last modification:
27/03/2026

CVE-2026-33473

Publication date:
24/03/2026
Vikunja is an open-source self-hosted task management platform. Starting in version 0.13 and prior to version 2.2.1, any user that has enabled 2FA can have their TOTP reused during the standard 30 second validity window. Version 2.2.1 patches the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2026

CVE-2026-33474

Publication date:
24/03/2026
Vikunja is an open-source self-hosted task management platform. Starting in version 1.0.0-rc0 and prior to version 2.2.0, unbounded image decoding and resizing during preview generation lets an attacker exhaust CPU and memory with highly compressed but extremely large-dimension images. Version 2.2.0 patches the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2026

CVE-2026-29839

Publication date:
24/03/2026
DedeCMS v5.7.118 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability in /sys_task_add.php.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2026

CVE-2026-29840

Publication date:
24/03/2026
JiZhiCMS v2.5.6 and before contains a Stored Cross-Site Scripting (XSS) vulnerability in the release function within app/home/c/UserController.php. The application attempts to sanitize input by filtering tags but fails to recursively remove dangerous event handlers in other HTML tags (such as onerror in tags). This allows an authenticated remote attacker to inject arbitrary web script or HTML via the body parameter in a POST request to /user/release.html.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2026

CVE-2025-71275

Publication date:
24/03/2026
Rejected reason: This CVE was rejected due to being a duplicate of CVE-2024-45519.
Severity CVSS v4.0: CRITICAL
Last modification:
25/03/2026