Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-564f-wx8x-878h | Vikunja read-only users can delete project background images via broken object-level authorization |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vikunja
Vikunja vikunja |
|
| CPEs | cpe:2.3:a:vikunja:vikunja:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vikunja
Vikunja vikunja |
|
| Metrics |
cvssV3_1
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Go-vikunja
Go-vikunja vikunja |
|
| Vendors & Products |
Go-vikunja
Go-vikunja vikunja |
Fri, 20 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vikunja is an open-source self-hosted task management platform. Starting in version 0.20.2 and prior to version 2.2.0, the `DELETE /api/v1/projects/:project/background` endpoint checks `CanRead` permission instead of `CanUpdate`, allowing any user with read-only access to a project to permanently delete its background image. Version 2.2.0 fixes the issue. | |
| Title | Read-only Vikunja users can delete project background images via broken object-level authorization | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T19:24:20.400Z
Reserved: 2026-03-18T21:23:36.676Z
Link: CVE-2026-33312
Updated: 2026-03-20T19:24:00.808Z
Status : Analyzed
Published: 2026-03-20T15:16:18.010
Modified: 2026-03-24T21:17:38.897
Link: CVE-2026-33312
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:53:29Z
Github GHSA