CVE-2026-28268: Vikunja RCE — Critical — Patch Now
CVE-2026-28268
Vikunja is an open-source self-hosted task management platform. Versions prior to 2.1.0 have a business logic vulnerability exists in the password reset mechanism of vikunja/api that allows password r...
Overview
A critical security vulnerability exists in the Vikunja open-source task management platform. This flaw allows attackers to take over user accounts permanently by reusing a single password reset token.
Vulnerability Details
In Vikunja versions before 2.1.0, the password reset mechanism contains a severe logic flaw. Normally, a password reset link sent to your email can only be used once. However, due to a programming error, these tokens were never properly invalidated after use. Furthermore, a scheduled cleanup task designed to remove old tokens was broken.
This combination means that any password reset token ever generated remains valid forever. An attacker who obtains just one token-through methods like intercepting unencrypted email, accessing server logs, or even seeing it briefly in a browser’s history-can use it to reset that user’s password at any future time, even years later.
Impact
The impact of this vulnerability is severe (CVSS Score: 9.8 - CRITICAL). Successful exploitation leads to:
- Complete Account Takeover: An attacker can change the victim’s password and gain full, persistent control of their Vikunja account.
- Data Breach: All tasks, notes, and project data within the compromised account are exposed.
- Persistence: Unlike typical reset flaws, this attack is not time-sensitive. A stolen token provides a permanent backdoor.
- Bypassed Authentication: The attacker completely bypasses normal login controls like passwords or multi-factor authentication.
Remediation and Mitigation
Immediate action is required to protect your Vikunja instance.
Primary Fix: Upgrade The only complete solution is to upgrade Vikunja to version 2.1.0 or later. This version contains the necessary patches to properly invalidate tokens after use and fix the cleanup task.
Immediate Mitigations (If Upgrade is Delayed):
- Audit Logs: Review application and server logs for any suspicious access or unexpected password reset activity.
- User Notification: Inform all users of the critical risk. Advise them to monitor their accounts for unauthorized activity and to use strong, unique passwords.
- Monitor for Tokens: If possible, scan outgoing email logs or proxy logs for exposed password reset links (URLs containing
/reset/). - Isolate the Instance: Consider restricting network access to the Vikunja instance to only trusted users until the upgrade can be performed.
After upgrading to 2.1.0, all previously issued password reset tokens will be properly handled by the new logic. It is also good practice to encourage users to review their active sessions from the account settings page post-upgrade.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-28268?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate's recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A cr...
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directo...
The goodoneuz/pay-uz Laravel package (<= 2.2.24) contains a critical vulnerability in the /payment/api/editable/update endpoint that allows unauthenticated attackers to overwrite existing PHP payment ...
SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file /music/view_user.php....