VYPR
Unrated severityNVD Advisory· Published Mar 24, 2026· Updated Mar 25, 2026

Vikunja Desktop allows arbitrary local application invocation via unvalidated shell.openExternal

CVE-2026-33335

Description

Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper passes URLs from window.open() calls directly to shell.openExternal() without any validation or protocol allowlisting. An attacker who can place a link with target="_blank" (or that otherwise triggers window.open) in user-generated content can cause the victim's operating system to open arbitrary URI schemes, invoking local applications, opening local files, or triggering custom protocol handlers. Version 2.2.0 patches the issue.

Affected products

2
  • Vikunja/Vikunjallm-fuzzy
    Range: >=0.21.0, <2.2.0
  • go-vikunja/vikunjav5
    Range: >= 0.21.0, < 2.2.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.