{"id":"GO-2026-4552","summary":"Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api","details":"Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api","aliases":["CVE-2026-27116","GHSA-4qgr-4h56-8895"],"modified":"2026-03-09T01:12:58.193457Z","published":"2026-02-27T02:17:00Z","database_specific":{"url":"https://pkg.go.dev/vuln/GO-2026-4552","review_status":"UNREVIEWED"},"references":[{"type":"ADVISORY","url":"https://github.com/go-vikunja/vikunja/security/advisories/GHSA-4qgr-4h56-8895"},{"type":"WEB","url":"https://github.com/go-vikunja/vikunja/commit/a42b4f37bde58596a3b69482cd5a67641a94f62d"},{"type":"WEB","url":"https://github.com/go-vikunja/vikunja/releases/tag/v2.0.0"}],"affected":[{"package":{"name":"code.vikunja.io/api","ecosystem":"Go","purl":"pkg:golang/code.vikunja.io/api"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"}]}],"ecosystem_specific":{},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2026-4552.json"}}],"schema_version":"1.7.3"}