CVE-2026-33679 PUBLISHED

Vikunja has SSRF via OpenID Connect Avatar Download that Bypasses Webhook SSRF Protections

Assigner: GitHub_M
Reserved: 23.03.2026 Published: 24.03.2026 Updated: 24.03.2026

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the DownloadImage function in pkg/utils/avatar.go uses a bare http.Client{} with no SSRF protection when downloading user avatar images from the OpenID Connect picture claim URL. An attacker who controls their OIDC profile picture URL can force the Vikunja server to make HTTP GET requests to arbitrary internal or cloud metadata endpoints. This bypasses the SSRF protections that are correctly applied to the webhook system. Version 2.2.1 patches the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L
CVSS Score: 6.4

Product Status

Vendor go-vikunja
Product vikunja
Versions
  • Version < 2.2.1 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE