Description
OpenViking versions prior to 0.3.3 contain a missing authorization vulnerability in the task polling endpoints that allows unauthorized attackers to enumerate or retrieve background task metadata created by other users. Attackers can access the /api/v1/tasks and /api/v1/tasks/{task_id} routes without authentication to expose task type, task status, resource identifiers, archive URIs, result payloads, and error information, potentially causing cross-tenant interference in multi-tenant deployments.
Published: 2026-04-07
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data exposure
Action: Immediate Patch
AI Analysis

Impact

OpenViking versions before 0.3.3 suffer from a missing authorization flaw on the task polling endpoints. Attackers can request /api/v1/tasks and /api/v1/tasks/{task_id} without any credentials, which returns detailed metadata about background tasks created by other users. The disclosed data includes task type, status, resource identifiers, archive URIs, result payloads, and error messages. In multi‑tenant deployments this enables cross‑tenant data exposure and can reveal sensitive information about other users’ operations.

Affected Systems

Known affected vendor is Volcengine, specifically the OpenViking project. All releases prior to 0.3.3 are impacted; versions 0.3.3 and later contain the authorization guard that protects the task polling routes. The vulnerability pertains only to the OpenViking codebase, not to other Volcengine products.

Risk and Exploitability

The CVSS base score of 6.9 places this issue in the medium‑to‑high severity range. No EPSS data is available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires only network access to the OpenViking API and does not depend on privileged credentials; therefore any unauthenticated user can enumerate tasks. The lack of an authentication check is the sole prerequisite, making the attack vector straightforward and the risk moderate to high for environments exposing the API to untrusted networks.

Generated by OpenCVE AI on April 7, 2026 at 21:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenViking to version 0.3.3 or later to enable proper authorization on task polling endpoints.
  • If immediate upgrade is not feasible, block unauthenticated access to /api/v1/tasks and /api/v1/tasks/{task_id} using firewall rules or reverse‑proxy authentication.
  • Enable logging of all API calls and monitor for abnormal enumeration activity, as an additional detection measure.

Generated by OpenCVE AI on April 7, 2026 at 21:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-h336-2wxm-pr6q OpenViking contains a missing authorization vulnerability in the task polling endpoints
History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Volcengine
Volcengine openviking
Vendors & Products Volcengine
Volcengine openviking
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description OpenViking versions prior to 0.3.3 contain a missing authorization vulnerability in the task polling endpoints that allows unauthorized attackers to enumerate or retrieve background task metadata created by other users. Attackers can access the /api/v1/tasks and /api/v1/tasks/{task_id} routes without authentication to expose task type, task status, resource identifiers, archive URIs, result payloads, and error information, potentially causing cross-tenant interference in multi-tenant deployments.
Title OpenViking < 0.3.3 Missing Authorization via Task Polling
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Volcengine Openviking
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-08T18:49:10.725Z

Reserved: 2026-01-08T19:04:26.365Z

Link: CVE-2026-22680

cve-icon Vulnrichment

Updated: 2026-04-08T18:48:59.171Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-07T18:16:38.853

Modified: 2026-04-08T21:27:00.663

Link: CVE-2026-22680

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:47:28Z

Weaknesses