Nixpkgs Security Tracker

Login with GitHub

Details of issue NIXPKGS-2026-0484

NIXPKGS-2026-0484
published on 28 Feb 2026
updated 1 week, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package vikunja-desktop
  • @LeSuisse added maintainer @adamcstephens
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse

Vikunja is an open-source self-hosted task management platform. Versions prior to 2.1.0 have a business logic vulnerability exists in the password reset mechanism of vikunja/api that allows password reset tokens to be reused indefinitely. Due to a failure to invalidate tokens upon use and a critical logic bug in the token cleanup cron job, reset tokens remain valid forever. This allows an attacker who intercepts a single reset token (via logs, browser history, or phishing) to perform a complete, persistent account takeover at any point in the future, bypassing standard authentication controls. Version 2.1.0 contains a patch for the issue.

Affected products

vikunja
  • ==< 2.1.0

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Additional maintainers

Upstream advisory: https://github.com/go-vikunja/vikunja/security/advisories/GHSA-rfjg-6m84-crj2
Upstream patch: https://github.com/go-vikunja/vikunja/commit/5c2195f9fca9ad208477e865e6009c37889f87b2