Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-33336

CVE-2026-33336: Vikunja Desktop RCE Vulnerability

CVE-2026-33336 is a remote code execution flaw in Vikunja Desktop that allows attackers to execute arbitrary code through malicious links. This post covers the technical details, affected versions, impact, and mitigation.

Published: March 27, 2026

CVE-2026-33336 Overview

CVE-2026-33336 is a Code Injection vulnerability in Vikunja, an open-source self-hosted task management platform. The Vikunja Desktop Electron wrapper enables nodeIntegration in the main BrowserWindow and does not restrict same-window navigations, allowing attackers to achieve arbitrary code execution on victim machines through user-generated content containing hyperlinks.

Critical Impact

An attacker who can place a link in user-generated content (task descriptions, comments, project descriptions) can cause the BrowserWindow to navigate to an attacker-controlled origin, where JavaScript executes with full Node.js access, resulting in arbitrary code execution on the victim's machine.

Affected Products

  • Vikunja Desktop versions 0.21.0 through 2.1.x
  • Vikunja Electron wrapper with nodeIntegration: true configuration
  • All platforms running the vulnerable Vikunja Desktop application

Discovery Timeline

  • 2026-03-24 - CVE CVE-2026-33336 published to NVD
  • 2026-03-25 - Last updated in NVD database

Technical Details for CVE-2026-33336

Vulnerability Analysis

This vulnerability stems from a dangerous combination of Electron security misconfigurations in the Vikunja Desktop application. The core issue lies in how the application handles renderer process permissions and navigation events. When nodeIntegration is enabled, any JavaScript code running in the BrowserWindow gains unrestricted access to Node.js APIs including require, child_process, fs, and other powerful system-level functions.

The vulnerability is particularly dangerous because it does not require an XSS exploit or bypassing any sanitization. A normal, sanitizer-approved hyperlink is sufficient to trigger the attack. The DOMPurify sanitization correctly allows standard anchor tags since they are legitimate HTML elements, but the Electron wrapper fails to handle the security implications of navigating to external origins in a privileged context.

Root Cause

Two misconfigurations combine to create this vulnerability:

  1. nodeIntegration: true is set in BrowserWindow web preferences (desktop/main.js:14-16), giving any page loaded in the renderer full access to Node.js APIs (require, child_process, fs, etc.).

  2. No will-navigate or will-redirect handler is registered on the webContents. The existing setWindowOpenHandler (desktop/main.js:19-23) only intercepts window.open() calls (new-window requests). It does not intercept same-window navigations triggered by <a href> links without target="_blank", window.location assignments, HTTP redirects, or <meta http-equiv="refresh"> tags.

Attack Vector

The attack scenario exploits the network-accessible nature of shared Vikunja instances:

  1. The attacker is a normal user on the same Vikunja instance, such as a member of a shared project.

  2. The attacker creates or edits a project description or task description containing a standard HTML link pointing to an attacker-controlled server.

  3. The Vikunja frontend renders this link. DOMPurify sanitization correctly allows it since it is a legitimate anchor tag, not a script injection. The render path through frontend/src/views/project/ProjectInfo.vue uses v-html with DOMPurify-sanitized output.

  4. The victim uses Vikunja Desktop and clicks the link.

  5. Because no will-navigate handler exists, the BrowserWindow navigates to the attacker's URL in the same renderer process.

  6. The attacker's page now executes in a context with nodeIntegration: true and can invoke Node.js APIs directly, such as require('child_process').exec() to execute arbitrary system commands.

  7. Arbitrary commands execute as the victim's OS user, enabling full system compromise.

Detection Methods for CVE-2026-33336

Indicators of Compromise

  • Unexpected outbound network connections from the Vikunja Desktop process to unknown external domains
  • Child processes spawned by the Electron renderer process, particularly command shells or system utilities
  • Unusual file system activity originating from the Vikunja Desktop application
  • Process execution chains showing the Electron application as parent of suspicious commands

Detection Strategies

  • Monitor for Node.js child process spawning from Electron applications with nodeIntegration enabled
  • Implement network traffic analysis to detect navigation to untrusted external domains from desktop applications
  • Deploy endpoint detection rules that flag unexpected child_process.exec() or child_process.spawn() calls from Electron renderers
  • Audit user-generated content in Vikunja for suspicious hyperlinks pointing to uncommon or newly registered domains

Monitoring Recommendations

  • Enable process creation logging to track child processes spawned by Vikunja Desktop
  • Configure network monitoring to alert on external navigation from the application
  • Implement file integrity monitoring for sensitive system directories accessed during Vikunja Desktop sessions
  • Review application logs for unusual navigation patterns or external URL access

How to Mitigate CVE-2026-33336

Immediate Actions Required

  • Upgrade Vikunja Desktop to version 2.2.0 or later immediately
  • Disable or remove vulnerable Vikunja Desktop versions from all endpoints until patching is complete
  • Restrict access to shared Vikunja projects to trusted users only as an interim measure
  • Consider using the web browser interface instead of the Desktop application until patched

Patch Information

Version 2.2.0 patches this vulnerability by addressing the Electron security misconfigurations. Organizations should update through their standard software deployment mechanisms. The fix is documented in the Vikunja Release Changelog and the GitHub Security Advisory.

Workarounds

  • Use the Vikunja web interface through a standard browser instead of the Electron Desktop application
  • Implement network-level controls to block outbound navigation to untrusted domains from the Desktop application
  • Restrict project membership to trusted users to limit attack surface from user-generated content
  • Deploy application-level firewalls or sandbox environments to contain potential exploitation
bash
# Verify current Vikunja Desktop version and upgrade if necessary
# Check installed version
vikunja-desktop --version

# Download and install patched version 2.2.0+
# Follow official upgrade documentation at https://vikunja.io

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechVikunja

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.38%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-94
  • Technical References
  • GitHub Security Advisory

  • Vikunja Release Changelog
  • Related CVEs
  • CVE-2026-33335: Vikunja Desktop Electron RCE Vulnerability

  • CVE-2026-33334: Vikunja Desktop RCE Vulnerability

  • CVE-2026-35602: Vikunja File Size Bypass Vulnerability

  • CVE-2026-35598: Vikunja Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English