Cyber Posture

CVE-2026-27616

HighPublic PoC

Published: 25 February 2026

Published
25 February 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
EPSS Score 0.0006 20.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27616 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Vikunja Vikunja. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique JavaScript (T1059.007); ranked at the 20.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to JavaScript (T1059.007) and 2 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-79

Penetration testing submits XSS payloads to web applications, detecting cross-site scripting flaws for subsequent remediation.

addresses: CWE-79

Validates web inputs to reject script-related content that could produce XSS.

addresses: CWE-79

Output validation against expected content can reject or sanitize script content in generated web pages, reducing XSS exploitability.

MITRE ATT&CK Enterprise TechniquesAI

T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1528 Steal Application Access Token Credential Access
Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Stored XSS via unsanitized SVG upload directly enables arbitrary JavaScript execution (T1059.007) in victim browser context and subsequent theft of application access tokens from localStorage (T1528), facilitating session hijacking (T1185) and account impersonation.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Vikunja is an open-source self-hosted task management platform. Prior to version 2.0.0, the application allows users to upload SVG files as task attachments. SVG is an XML-based format that supports JavaScript execution through elements such as <script> tags or event…

more

handlers like onload. The application does not sanitize SVG content before storing it. When the uploaded SVG file is accessed via its direct URL, it is rendered inline in the browser under the application's origin. As a result, embedded JavaScript executes in the context of the authenticated user. Because the authentication token is stored in localStorage, it is accessible via JavaScript and can be retrieved by a malicious payload. Version 2.0.0 patches this issue.

Deeper analysisAI

CVE-2026-27616 is a stored cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting Vikunja, an open-source self-hosted task management platform. Prior to version 2.0.0, Vikunja permits users to upload SVG files as task attachments without sanitizing their content. SVG, an XML-based format, supports JavaScript execution through elements like <script> tags or event handlers such as onload. When an uploaded SVG is accessed via its direct URL, it renders inline in the browser under the application's origin, allowing embedded JavaScript to execute in the context of the authenticated user. The vulnerability was published on 2026-02-25 and carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N).

An attacker with low privileges (PR:L), such as any authenticated user, can exploit this by uploading a malicious SVG file containing JavaScript payloads as a task attachment. Exploitation requires a victim user (also authenticated) to interact by accessing the SVG's direct URL (UI:R), at which point the JavaScript executes in the victim's browser session. This grants access to the victim's authentication token stored in localStorage, enabling the attacker to exfiltrate it and potentially impersonate the victim for further actions, resulting in high confidentiality and integrity impacts.

The official GitHub security advisory (GHSA-7jp5-298q-jg98) documents the issue, including a proof-of-concept in an attached PDF. Vikunja's changelog confirms that version 2.0.0 patches the vulnerability by addressing SVG content sanitization during uploads. Security practitioners should advise upgrading to version 2.0.0 or later to mitigate the risk.

Details

CWE(s)

Affected Products

vikunja
vikunja
≤ 2.0.0

CVEs Like This One

CVE-2026-33334Same product: Vikunja Vikunja
CVE-2026-35602Same product: Vikunja Vikunja
CVE-2026-35597Same product: Vikunja Vikunja
CVE-2026-33668Same product: Vikunja Vikunja
CVE-2026-33335Same product: Vikunja Vikunja
CVE-2026-27575Same product: Vikunja Vikunja
CVE-2026-33336Same product: Vikunja Vikunja
CVE-2026-34727Same product: Vikunja Vikunja
CVE-2026-35595Same product: Vikunja Vikunja
CVE-2026-33680Same product: Vikunja Vikunja

References