Description
Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper passes URLs from `window.open()` calls directly to `shell.openExternal()` without any validation or protocol allowlisting. An attacker who can place a link with `target="_blank"` (or that otherwise triggers `window.open`) in user-generated content can cause the victim's operating system to open arbitrary URI schemes, invoking local applications, opening local files, or triggering custom protocol handlers. Version 2.2.0 patches the issue.
INFO
Published Date :
2026-03-24T15:07:41.460Z
Last Modified :
2026-03-25T13:41:50.096Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-33335 vulnerability.
| Vendors | Products |
|---|---|
| Go-vikunja |
|
| Vikunja |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33335.