Unrated severityNVD Advisory· Published Mar 24, 2026· Updated Mar 25, 2026
Vikunja Desktop allows arbitrary local application invocation via unvalidated shell.openExternal
CVE-2026-33335
Description
Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper passes URLs from window.open() calls directly to shell.openExternal() without any validation or protocol allowlisting. An attacker who can place a link with target="_blank" (or that otherwise triggers window.open) in user-generated content can cause the victim's operating system to open arbitrary URI schemes, invoking local applications, opening local files, or triggering custom protocol handlers. Version 2.2.0 patches the issue.
Affected products
2- go-vikunja/vikunjav5Range: >= 0.21.0, < 2.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/go-vikunja/vikunja/security/advisories/GHSA-6q44-85gc-cjvfmitrex_refsource_CONFIRM
- vikunja.io/changelog/vikunja-v2.2.0-was-releasedmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.