Medium severity5.3NVD Advisory· Published Apr 7, 2026· Updated Apr 14, 2026
CVE-2026-22680
CVE-2026-22680
Description
OpenViking versions prior to 0.3.3 contain a missing authorization vulnerability in the task polling endpoints that allows unauthorized attackers to enumerate or retrieve background task metadata created by other users. Attackers can access the /api/v1/tasks and /api/v1/tasks/{task_id} routes without authentication to expose task type, task status, resource identifiers, archive URIs, result payloads, and error information, potentially causing cross-tenant interference in multi-tenant deployments.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
OpenVikingPyPI | < 0.3.3 | 0.3.3 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/volcengine/OpenViking/commit/8c1c3f3608364ee0bb0e45f73478771a68aebdf5nvdPatchWEB
- github.com/volcengine/OpenViking/pull/1182nvdExploitIssue TrackingThird Party AdvisoryWEB
- github.com/advisories/GHSA-h336-2wxm-pr6qghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-22680ghsaADVISORY
- www.vulncheck.com/advisories/openviking-missing-authorization-via-task-pollingnvdThird Party AdvisoryWEB
- github.com/volcengine/OpenViking/releases/tag/v0.3.3nvdRelease NotesWEB
News mentions
0No linked articles in our index yet.