Description
Vikunja is an open-source self-hosted task management platform. Versions prior to 2.1.0 have a business logic vulnerability exists in the password reset mechanism of vikunja/api that allows password reset tokens to be reused indefinitely. Due to a failure to invalidate tokens upon use and a critical logic bug in the token cleanup cron job, reset tokens remain valid forever. This allows an attacker who intercepts a single reset token (via logs, browser history, or phishing) to perform a complete, persistent account takeover at any point in the future, bypassing standard authentication controls. Version 2.1.0 contains a patch for the issue.
Published: 2026-02-27
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Account takeover
Action: Immediate Patch
AI Analysis

Impact

Vikunja, an open‑source self‑hosted task management platform, has a business logic flaw that allows password reset tokens to be reused indefinitely. The system fails to invalidate used tokens and the cleanup cron job never removes them, so once a token is issued it remains valid forever. An attacker who obtains any single reset token—by reading server logs, inspecting browser history, or phishing—can later use that token at any time to log in as the designated user. This results in complete, persistent account takeover and bypasses all standard authentication controls.

Affected Systems

All installations of Vikunja before version 2.1.0 are affected. The issue was fixed in release 2.1.0, so any instance still running an older version is at risk.

Risk and Exploitability

The CVSS score of 9.8 reflects a severe impact. The EPSS score of less than 1% indicates a currently low likelihood of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is the password reset flow, requiring only possession of a valid token—a token that can be extracted from logs, browser history, or through phishing. Once in possession of such a token, the attacker can complete the takeover at any future point, highlighting a high exploitation potential if the token is compromised.

Generated by OpenCVE AI on April 17, 2026 at 13:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Vikunja 2.1.0 or later, which invalidates password reset tokens when used.
  • Disable or restrict the password reset feature on affected installations until the patch can be applied to eliminate the possibility of token reuse.
  • Clear any stored reset tokens from logs, browser history, or other repositories, and rotate relevant cryptographic secrets if possible to invalidate any leaked tokens.

Generated by OpenCVE AI on April 17, 2026 at 13:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rfjg-6m84-crj2 Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse
History

Fri, 06 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Vikunja
Vikunja vikunja
CPEs cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:*
Vendors & Products Vikunja
Vikunja vikunja

Tue, 03 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Go-vikunja
Go-vikunja vikunja
Vendors & Products Go-vikunja
Go-vikunja vikunja

Fri, 27 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
Description Vikunja is an open-source self-hosted task management platform. Versions prior to 2.1.0 have a business logic vulnerability exists in the password reset mechanism of vikunja/api that allows password reset tokens to be reused indefinitely. Due to a failure to invalidate tokens upon use and a critical logic bug in the token cleanup cron job, reset tokens remain valid forever. This allows an attacker who intercepts a single reset token (via logs, browser history, or phishing) to perform a complete, persistent account takeover at any point in the future, bypassing standard authentication controls. Version 2.1.0 contains a patch for the issue.
Title Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse
Weaknesses CWE-459
CWE-640
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Go-vikunja Vikunja
Vikunja Vikunja
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-03T20:26:53.644Z

Reserved: 2026-02-26T01:52:58.732Z

Link: CVE-2026-28268

cve-icon Vulnrichment

Updated: 2026-03-03T20:26:48.321Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T21:16:18.233

Modified: 2026-03-06T21:03:09.780

Link: CVE-2026-28268

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:00:15Z

Weaknesses