Vulnerability Report: GO-2026-4552

Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api

For detailed information about this vulnerability, visit https://github.com/go-vikunja/vikunja/security/advisories/GHSA-4qgr-4h56-8895.

Affected Modules

Aliases

References

Feedback

This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect? Suggest an edit to this report.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL