Description
Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, task titles are embedded directly into Markdown link syntax in overdue email notifications without escaping Markdown special characters. When rendered by goldmark and sanitized by bluemonday (which allows <a> and <img> tags), injected Markdown constructs produce phishing links and tracking pixels in legitimate notification emails. This vulnerability is fixed in 2.3.0.
Published: 2026-04-10
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Phishing/Tracking via Email
Action: Immediate Patch
AI Analysis

Impact

Vikunja, an open‑source self‑hosted task management platform, renders task titles directly inside Markdown link syntax in overdue email notifications. Prior to version 2.3.0 the Markdown engine (goldmark) and sanitiser (bluemonday) do not escape special characters, allowing an attacker to embed malicious Markdown that translates into untrusted HTML when the email is rendered. This can produce phishing links or tracking pixels within legitimate notification emails. The vulnerability does not grant arbitrary code execution but enables social‑engineering attacks and covert monitoring of user interactions with those emails.

Affected Systems

The flaw affects all instances of Vikunja running any version older than 2.3.0. The CNA lists the product as go‑vikunja:vikunja. Users deploying the open‑source platform in self‑hosted environments are at risk until they update to the patched release.

Risk and Exploitability

The CVSS base score is 5.4, indicating a medium severity. EPSS information is not provided, and the vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector is remote via email notifications sent to end users; an attacker needs the ability to create or edit a task title containing malicious content. Exploitation is straightforward for anyone with write access to tasks, making the risk significant for environments with insufficient user controls.

Generated by OpenCVE AI on April 10, 2026 at 17:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vikunja to version 2.3.0 or newer, where the injection issue is fixed.
  • If upgrading immediately is not possible, disable or suppress overdue email notifications until a patch can be applied.
  • Review existing task titles for embedded HTML or Markdown constructs and correct or escape them manually.
  • Consider enabling stricter email content filtering to block suspicious HTML tags if notifications cannot be disabled.

Generated by OpenCVE AI on April 10, 2026 at 17:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-45q4-x4r9-8fqj Vikunja has HTML Injection via Task Titles in Overdue Email Notifications
History

Fri, 17 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Vikunja
Vikunja vikunja
CPEs cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:*
Vendors & Products Vikunja
Vikunja vikunja

Tue, 14 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Go-vikunja
Go-vikunja vikunja
Vendors & Products Go-vikunja
Go-vikunja vikunja

Fri, 10 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, task titles are embedded directly into Markdown link syntax in overdue email notifications without escaping Markdown special characters. When rendered by goldmark and sanitized by bluemonday (which allows <a> and <img> tags), injected Markdown constructs produce phishing links and tracking pixels in legitimate notification emails. This vulnerability is fixed in 2.3.0.
Title Vikunja has HTML Injection via Task Titles in Overdue Email Notifications
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Go-vikunja Vikunja
Vikunja Vikunja
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-14T15:01:18.724Z

Reserved: 2026-04-03T21:25:12.162Z

Link: CVE-2026-35600

cve-icon Vulnrichment

Updated: 2026-04-14T15:01:13.639Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T17:17:03.680

Modified: 2026-04-17T21:56:40.090

Link: CVE-2026-35600

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T13:00:28Z

Weaknesses