{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-33473","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-20T16:16:48.969Z","datePublished":"2026-03-24T15:18:14.481Z","dateUpdated":"2026-03-24T17:11:26.042Z"},"containers":{"cna":{"title":"Vikunja has TOTP Reuse During Validity Window","problemTypes":[{"descriptions":[{"cweId":"CWE-287","lang":"en","description":"CWE-287: Improper Authentication","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/go-vikunja/vikunja/security/advisories/GHSA-p747-qc5p-773r","tags":["x_refsource_CONFIRM"],"url":"https://github.com/go-vikunja/vikunja/security/advisories/GHSA-p747-qc5p-773r"},{"name":"https://vikunja.io/changelog/vikunja-v2.2.0-was-released","tags":["x_refsource_MISC"],"url":"https://vikunja.io/changelog/vikunja-v2.2.0-was-released"},{"name":"https://vikunja.io/changelog/vikunja-v2.2.2-was-released","tags":["x_refsource_MISC"],"url":"https://vikunja.io/changelog/vikunja-v2.2.2-was-released"}],"affected":[{"vendor":"go-vikunja","product":"vikunja","versions":[{"version":">= 0.13, < 2.2.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-24T15:18:14.481Z"},"descriptions":[{"lang":"en","value":"Vikunja is an open-source self-hosted task management platform. Starting in version 0.13 and prior to version 2.2.1, any user that has enabled 2FA can have their TOTP reused during the standard 30 second validity window. Version 2.2.1 patches the issue."}],"source":{"advisory":"GHSA-p747-qc5p-773r","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-24T17:05:22.501107Z","id":"CVE-2026-33473","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-24T17:11:26.042Z"}}]}}