CVE-2026-28268
EUVD-2026-906427.02.2026, 21:16
Vikunja is an open-source self-hosted task management platform. Versions prior to 2.1.0 have a business logic vulnerability exists in the password reset mechanism of vikunja/api that allows password reset tokens to be reused indefinitely. Due to a failure to invalidate tokens upon use and a critical logic bug in the token cleanup cron job, reset tokens remain valid forever. This allows an attacker who intercepts a single reset token (via logs, browser history, or phishing) to perform a complete, persistent account takeover at any point in the future, bypassing standard authentication controls. Version 2.1.0 contains a patch for the issue.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| vikunja | vikunja | 𝑥 < 2.1.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-459 - Incomplete CleanupThe software does not properly "clean up" and remove temporary or supporting resources after they have been used.
- CWE-640 - Weak Password Recovery Mechanism for Forgotten PasswordThe software contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.