CVE-2026-33335 PUBLISHED

Vikunja Desktop allows arbitrary local application invocation via unvalidated shell.openExternal

Assigner: GitHub_M
Reserved: 18.03.2026 Published: 24.03.2026 Updated: 24.03.2026

Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper passes URLs from window.open() calls directly to shell.openExternal() without any validation or protocol allowlisting. An attacker who can place a link with target="_blank" (or that otherwise triggers window.open) in user-generated content can cause the victim's operating system to open arbitrary URI schemes, invoking local applications, opening local files, or triggering custom protocol handlers. Version 2.2.0 patches the issue.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
CVSS Score: 6.4

Product Status

Vendor go-vikunja
Product vikunja
Versions
  • Version >= 0.21.0, < 2.2.0 is affected

References

Problem Types

  • CWE-939: Improper Authorization in Handler for Custom URL Scheme CWE