Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0484

NIXPKGS-2026-0484
published on
Permalink CVE-2026-28268
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 months ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package vikunja-desktop
  • @LeSuisse added maintainer @adamcstephens maintainer.add
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse

Vikunja is an open-source self-hosted task management platform. Versions prior to 2.1.0 have a business logic vulnerability exists in the password reset mechanism of vikunja/api that allows password reset tokens to be reused indefinitely. Due to a failure to invalidate tokens upon use and a critical logic bug in the token cleanup cron job, reset tokens remain valid forever. This allows an attacker who intercepts a single reset token (via logs, browser history, or phishing) to perform a complete, persistent account takeover at any point in the future, bypassing standard authentication controls. Version 2.1.0 contains a patch for the issue.

Affected products

vikunja
  • ==< 2.1.0

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Additional maintainers

Upstream advisory: https://github.com/go-vikunja/vikunja/security/advisories/GHSA-rfjg-6m84-crj2
Upstream patch: https://github.com/go-vikunja/vikunja/commit/5c2195f9fca9ad208477e865e6009c37889f87b2