Untriaged
Permalink
CVE-2026-35594
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
Vikunja Link Share JWT tokens remain valid for 72 hours after share deletion or permission downgrade
Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, Vikunja's link share authentication (GetLinkShareFromClaims in pkg/models/link_sharing.go) constructs authorization objects entirely from JWT claims without any server-side database validation. When a project owner deletes a link share or downgrades its permissions, all previously issued JWTs continue to grant the original permission level for up to 72 hours (the default service.jwtttl). This vulnerability is fixed in 2.3.0.
References
-
https://github.com/go-vikunja/vikunja/security/advisories/GHSA-96q5-xm3p-7m84 x_refsource_CONFIRM
-
https://github.com/go-vikunja/vikunja/pull/2581 x_refsource_MISC
-
https://github.com/go-vikunja/vikunja/releases/tag/v2.3.0 x_refsource_MISC
Affected products
vikunja
- ==< 2.3.0
Matching in nixpkgs
pkgs.vikunja
Todo-app to organize your life
pkgs.vikunja-desktop
Desktop App of the Vikunja to-do list app
Package maintainers
-
@leona-ya Leona Maroni <nix@leona.is>
-
@adamcstephens Adam C. Stephens <happy.plan4249@valkor.net>