Vikunja Desktop vulnerable to Remote Code Execution via same-window navigation
Description
Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper enables nodeIntegration in the main BrowserWindow and does not restrict same-window navigations. An attacker who can place a link in user-generated content (task descriptions, comments, project descriptions) can cause the BrowserWindow to navigate to an attacker-controlled origin, where JavaScript executes with full Node.js access, resulting in arbitrary code execution on the victim's machine. Version 2.2.0 patches the issue.
Root cause
Two misconfigurations combine to create this vulnerability:
- **
nodeIntegration: true** is set inBrowserWindowweb preferences (desktop/main.js:14-16), giving any page loaded in the renderer full access to Node.js APIs (require,child_process,fs, etc.).
2. **No will-navigate or will-redirect handler** is registered on the webContents. The existing setWindowOpenHandler (desktop/main.js:19-23) only intercepts window.open() calls (new-window requests). It does not intercept same-window navigations triggered by: - ` links (without target="_blank") - window.location assignments - HTTP redirects - ` tags
Attack scenario
- The attacker is a normal user on the same Vikunja instance (e.g., a member of a shared project).
- The attacker creates or edits a project description or task description containing a standard HTML link, e.g.:
Click here for the updated design spec - The Vikunja frontend renders this link. DOMPurify sanitization correctly allows it -- it is a legitimate anchor tag, not a script injection. Render path example:
frontend/src/views/project/ProjectInfo.vueusesv-htmlwith DOMPurify-sanitized output. - The victim uses Vikunja Desktop and clicks the link.
- Because no
will-navigatehandler exists, the BrowserWindow navigates tohttps://evil.example/exploitin the same renderer process. - The attacker's page now executes in a context with
nodeIntegration: trueand runs:require('child_process').exec('id > /tmp/pwned'); - Arbitrary commands execute as the victim's OS user.
Impact
Full remote code execution on the victim's desktop. The attacker can read/write arbitrary files, execute arbitrary commands, install malware or backdoors, and exfiltrate credentials and sensitive data. No XSS vulnerability is required -- a normal, sanitizer-approved hyperlink is sufficient.
Proof of concept
- Set up a Vikunja instance with two users sharing a project.
- As the attacker user, edit a project description to include:
Meeting notes - Host poc.html with: ``
- As the victim, open the project in Vikunja Desktop and click the link.
- calc.exe (or any other command) executes on the victim's machine.
Credits
This vulnerability was found using GitHub Security Lab Taskflows.
Affected products
2- go-vikunja/vikunjav5Range: >= 0.21.0, < 2.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/go-vikunja/vikunja/security/advisories/GHSA-83w9-9jf6-88vfmitrex_refsource_CONFIRM
- vikunja.io/changelog/vikunja-v2.2.0-was-releasedmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.