Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22602: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in opf openproject

0
Low
VulnerabilityCVE-2026-22602cvecve-2026-22602cwe-200
Published: Sat Jan 10 2026 (01/10/2026, 01:06:12 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

OpenProject is an open-source, web-based project management software. Prior to version 16.6.2, a low‑privileged logged-in user can view the full names of other users. Since user IDs are assigned sequentially and predictably (e.g., 1 to 1000), an attacker can extract a complete list of all users’ full names by iterating through these URLs. The same behavior can also be reproduced via the OpenProject API, allowing automated retrieval of full names through the API as well. This issue has been patched in version 16.6.2. Those who are unable to upgrade may apply the patch manually.

AI-Powered Analysis

AILast updated: 01/10/2026, 02:01:51 UTC

Technical Analysis

CVE-2026-22602 is an information disclosure vulnerability classified under CWE-200 affecting OpenProject, an open-source web-based project management tool. In versions prior to 16.6.2, a low-privileged authenticated user can access the full names of other users by exploiting the predictable sequential assignment of user IDs. Since user IDs increment sequentially (e.g., 1 to 1000), an attacker can iterate through user profile URLs or use the OpenProject API to automate the retrieval of all users’ full names. This exposure occurs because the system does not sufficiently restrict access to user identity information based on privilege levels. The vulnerability requires the attacker to be logged in with at least low privileges and some user interaction, but no elevated permissions are necessary. The vulnerability does not allow access to sensitive credentials or other personal data beyond full names, nor does it permit modification or disruption of the system. The issue has been addressed in OpenProject version 16.6.2, which restricts access to user information appropriately. Organizations unable to upgrade can apply the patch manually. There are no known exploits in the wild at this time, and the CVSS v3.1 base score is 3.5, reflecting low severity due to limited impact and exploitation complexity.

Potential Impact

For European organizations, the primary impact of CVE-2026-22602 is the unauthorized disclosure of user full names within OpenProject environments. While full names alone may seem low risk, they can facilitate social engineering, spear-phishing, or targeted reconnaissance by exposing organizational personnel details. This is particularly relevant for organizations managing sensitive or confidential projects where user identity exposure could indirectly lead to further attacks. The vulnerability does not compromise system integrity or availability, so operational disruption is unlikely. However, in sectors with strict privacy regulations such as GDPR, even limited personal data exposure can have compliance implications and reputational consequences. Organizations using OpenProject for project management should assess the sensitivity of their user data and the potential for misuse of exposed information. The risk is mitigated by the requirement for authenticated access, limiting exposure to insiders or compromised accounts.

Mitigation Recommendations

The primary mitigation is to upgrade OpenProject installations to version 16.6.2 or later, where the vulnerability is patched. For organizations unable to upgrade immediately, applying the official patch manually is recommended to restrict access to user full names. Additionally, organizations should enforce strong authentication controls to reduce the risk of unauthorized access by low-privileged users. Monitoring and logging API usage and user profile access patterns can help detect automated enumeration attempts. Limiting user permissions to the minimum necessary and reviewing user roles regularly will reduce the attack surface. Educating users about social engineering risks stemming from exposed user information can further mitigate downstream impacts. Finally, organizations should review their privacy policies and ensure compliance with data protection regulations regarding the exposure of personal data.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-07T21:50:39.533Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961b006ed32c7f018eb8fdd

Added to database: 1/10/2026, 1:48:54 AM

Last enriched: 1/10/2026, 2:01:51 AM

Last updated: 1/10/2026, 9:00:39 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats