Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. code.vikunja.io/api
  4. ›
  5. CVE-2026-33313

CVE-2026-33313: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments

March 20, 2026

An authenticated user can read any task comment by ID, regardless of whether they have access to the task the comment belongs to, by substituting the task ID in the API URL with a task they do have access to.

References

  • github.com/advisories/GHSA-mr3j-p26x-72x4
  • github.com/go-vikunja/vikunja
  • github.com/go-vikunja/vikunja/commit/bc6d843ed4df82a6c89f10aa676a7a33d27bf2fd
  • github.com/go-vikunja/vikunja/security/advisories/GHSA-mr3j-p26x-72x4
  • nvd.nist.gov/vuln/detail/CVE-2026-33313

Code Behaviors & Features

Detect and mitigate CVE-2026-33313 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 2.1.0

Solution

Unfortunately, there is no solution available yet.

Impact 4.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-639: Authorization Bypass Through User-Controlled Key

Source file

go/code.vikunja.io/api/CVE-2026-33313.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 21 Mar 2026 12:18:49 +0000.