Impact
A malformed ZIP archive processed by Vikunja's CLI restore command fails to sanitize file paths, allowing files to be written outside the intended extraction directory and thereby enabling arbitrary file overwrite on the host system; the vulnerability can also trigger a runtime panic that crashes the process and wipes the database immediately after restoration, resulting in denial of service. This weakness manifests as a Path Traversal flaw (CWE-22) and a Crash via unchecked slice bounds (CWE-248).
Affected Systems
All installations of the Vikunja task-management platform built from the go-vikunja/vikunja repository that use a version older than 2.0.0. The affected component is the CLI restore command in the modules/dump/restore.go module. Self-hosted deployments running any pre-2.0.0 release are vulnerable when processing a malicious ZIP archive during restoration.
Risk and Exploitability
The vulnerability has a CVSS v3.1 base score of 7.2, indicating a high impact severity. The EPSS score is below 1%, implying a very low current exploitation probability, and the issue is not listed in the CISA KEV catalog. The likely attack vector requires an attacker able to run the restore command locally or to supply a crafted ZIP archive to a system that accepts restoration; the manipulation of the zip file enables overwriting of arbitrary files, which could lead to privilege escalation or code injection, and the induced crash can cause service disruption and data loss. Proper privilege isolation of the restore process and sanitization of archive paths mitigate these risks.
OpenCVE Enrichment
Github GHSA