CVE-2026-28268 PUBLISHED

Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse

Assigner: GitHub_M
Reserved: 26.02.2026 Published: 27.02.2026 Updated: 27.02.2026

Vikunja is an open-source self-hosted task management platform. Versions prior to 2.1.0 have a business logic vulnerability exists in the password reset mechanism of vikunja/api that allows password reset tokens to be reused indefinitely. Due to a failure to invalidate tokens upon use and a critical logic bug in the token cleanup cron job, reset tokens remain valid forever. This allows an attacker who intercepts a single reset token (via logs, browser history, or phishing) to perform a complete, persistent account takeover at any point in the future, bypassing standard authentication controls. Version 2.1.0 contains a patch for the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8

Product Status

Vendor go-vikunja
Product vikunja
Versions
  • Version < 2.1.0 is affected

References

Problem Types

  • CWE-459: Incomplete Cleanup CWE
  • CWE-640: Weak Password Recovery Mechanism for Forgotten Password CWE