Cyber Posture

CVE-2026-33335

HighPublic PoC

Published: 24 March 2026

Published
24 March 2026
Modified
27 March 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0004 13.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33335 is a high-severity Improper Authorization in Handler for Custom URL Scheme (CWE-939) vulnerability in Vikunja Vikunja. Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 13.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of information inputs such as URLs from window.open() calls before passing to shell.openExternal(), directly preventing arbitrary URI scheme execution.

preventdetect

Mandates identification, reporting, and timely patching of flaws like the unvalidated URL handling in Vikunja Desktop versions prior to 2.2.0.

prevent

Enforces secure configuration settings for the Electron wrapper, including protocol restrictions or validation mechanisms to mitigate unsafe shell.openExternal usage.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The client-side Electron vulnerability allows direct exploitation of improper URL handling (window.open to shell.openExternal without validation) to invoke arbitrary URI schemes, local files, or protocol handlers, resulting in code execution on the victim desktop.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper passes URLs from `window.open()` calls directly to `shell.openExternal()` without any validation or protocol allowlisting. An attacker who can…

more

place a link with `target="_blank"` (or that otherwise triggers `window.open`) in user-generated content can cause the victim's operating system to open arbitrary URI schemes, invoking local applications, opening local files, or triggering custom protocol handlers. Version 2.2.0 patches the issue.

Deeper analysisAI

CVE-2026-33335 affects the Vikunja Desktop Electron wrapper, an open-source self-hosted task management platform. The vulnerability exists in versions starting from 0.21.0 and prior to 2.2.0, where URLs from `window.open()` calls are passed directly to `shell.openExternal()` without validation or protocol allowlisting. This flaw, classified under CWE-939 (Improper Authorization in Handler for Custom URL Scheme), has a CVSS v3.1 base score of 8.0 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).

An attacker with low privileges (PR:L), such as an authenticated user able to inject content into Vikunja, can exploit this by placing malicious links with `target="_blank"` or other triggers for `window.open()` in user-generated content. When a victim interacts with the link (UI:R), it causes the victim's operating system to open arbitrary URI schemes. This enables invoking local applications, opening local files, or triggering custom protocol handlers, potentially leading to high confidentiality, integrity, and availability impacts.

The GitHub security advisory (GHSA-6q44-85gc-cjvf) and Vikunja changelog for version 2.2.0 detail the patch, which resolves the issue by addressing the lack of validation in the Electron wrapper. Security practitioners should advise upgrading to version 2.2.0 or later to mitigate the vulnerability.

Details

CWE(s)

Affected Products

vikunja
vikunja
0.21.0 — 2.2.2

CVEs Like This One

CVE-2026-33334Same product: Vikunja Vikunja
CVE-2026-33336Same product: Vikunja Vikunja
CVE-2026-33668Same product: Vikunja Vikunja
CVE-2026-35595Same product: Vikunja Vikunja
CVE-2026-27819Same product: Vikunja Vikunja
CVE-2026-27575Same product: Vikunja Vikunja
CVE-2026-33680Same product: Vikunja Vikunja
CVE-2026-35602Same product: Vikunja Vikunja
CVE-2026-33316Same product: Vikunja Vikunja
CVE-2026-33678Same product: Vikunja Vikunja

References