CVE-2026-35594 PUBLISHED

Vikunja Link Share JWT tokens remain valid for 72 hours after share deletion or permission downgrade

Assigner: GitHub_M
Reserved: 03.04.2026 Published: 10.04.2026 Updated: 10.04.2026

Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, Vikunja's link share authentication (GetLinkShareFromClaims in pkg/models/link_sharing.go) constructs authorization objects entirely from JWT claims without any server-side database validation. When a project owner deletes a link share or downgrades its permissions, all previously issued JWTs continue to grant the original permission level for up to 72 hours (the default service.jwtttl). This vulnerability is fixed in 2.3.0.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS Score: 6.5

Product Status

Vendor go-vikunja
Product vikunja
Versions
  • Version < 2.3.0 is affected

References

Problem Types

  • CWE-613: Insufficient Session Expiration CWE