Vikunja is an open-source self-hosted task management platform. Prior to version 2.0.0, a reflected HTML injection vulnerability exists in the Projects module where the `filter` URL parameter is rendered into the DOM without output encoding when the user clicks "Filter." While `<script>` and `<iframe>` are blocked, `<svg>`, `<a>`, and formatting tags (`<h1>`, `<b>`, `<u>`) render without restriction — enabling SVG-based phishing buttons, external redirect links, and content spoofing within the trusted application origin. Version 2.0.0 fixes this issue.
Use CWE-79, Vikunja vendor hub and Vikunja product page to widen CVE-2026-27116 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-35595, CVE-2026-34727 and CVE-2026-33700 for nearby disclosures in the same product family.