PT-2026-27446 · Go Vikunja · Vikunja
Restriction
·
Published
2026-03-24
·
Updated
2026-03-24
·
CVE-2026-33675
CVSS v3.1
6.4
Medium
| AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L |
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the migration helper functions
DownloadFile and DownloadFileWithHeaders in pkg/modules/migration/helpers.go make arbitrary HTTP GET requests without any SSRF protection. When a user triggers a Todoist or Trello migration, file attachment URLs from the third-party API response are passed directly to these functions, allowing an attacker to force the Vikunja server to fetch internal network resources and return the response as a downloadable task attachment. Version 2.2.1 patches the issue.Exploit
Fix
SSRF
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Vikunja