CVE-2026-33679: Vikjuna Bypasses Webhook SSRF Protections During OpenID Connect Avatar Download
(updated )
The DownloadImage function in pkg/utils/avatar.go uses a bare http.Client{} with no SSRF protection when downloading user avatar images from the OpenID Connect picture claim URL. An attacker who controls their OIDC profile picture URL can force the Vikunja server to make HTTP GET requests to arbitrary internal or cloud metadata endpoints. This bypasses the SSRF protections that are correctly applied to the webhook system.
References
- github.com/advisories/GHSA-g9xj-752q-xh63
- github.com/go-vikunja/vikunja
- github.com/go-vikunja/vikunja/commit/363aa6642352b08fc8bc6aaff2f3a550393af1cf
- github.com/go-vikunja/vikunja/security/advisories/GHSA-g9xj-752q-xh63
- nvd.nist.gov/vuln/detail/CVE-2026-33679
- pkg.go.dev/vuln/GO-2026-4852
- vikunja.io/changelog/vikunja-v2.2.2-was-released
Code Behaviors & Features
Detect and mitigate CVE-2026-33679 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →