Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api.
NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.
(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)
The additional affected modules and versions are: code.vikunja.io/api before v2.2.0.
{
"review_status": "UNREVIEWED",
"url": "https://pkg.go.dev/vuln/GO-2026-4795"
}