CVE-2026-22602: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in opf openproject
OpenProject is an open-source, web-based project management software. Prior to version 16.6.2, a low‑privileged logged-in user can view the full names of other users. Since user IDs are assigned sequentially and predictably (e.g., 1 to 1000), an attacker can extract a complete list of all users’ full names by iterating through these URLs. The same behavior can also be reproduced via the OpenProject API, allowing automated retrieval of full names through the API as well. This issue has been patched in version 16.6.2. Those who are unable to upgrade may apply the patch manually.
AI Analysis
Technical Summary
CVE-2026-22602 is an information disclosure vulnerability classified under CWE-200 affecting OpenProject, an open-source web-based project management tool. In versions prior to 16.6.2, a low-privileged authenticated user can access the full names of other users by exploiting the predictable sequential assignment of user IDs. Since user IDs increment sequentially (e.g., 1 to 1000), an attacker can iterate through user profile URLs or use the OpenProject API to automate the retrieval of all users’ full names. This exposure occurs because the system does not sufficiently restrict access to user identity information based on privilege levels. The vulnerability requires the attacker to be logged in with at least low privileges and some user interaction, but no elevated permissions are necessary. The vulnerability does not allow access to sensitive credentials or other personal data beyond full names, nor does it permit modification or disruption of the system. The issue has been addressed in OpenProject version 16.6.2, which restricts access to user information appropriately. Organizations unable to upgrade can apply the patch manually. There are no known exploits in the wild at this time, and the CVSS v3.1 base score is 3.5, reflecting low severity due to limited impact and exploitation complexity.
Potential Impact
For European organizations, the primary impact of CVE-2026-22602 is the unauthorized disclosure of user full names within OpenProject environments. While full names alone may seem low risk, they can facilitate social engineering, spear-phishing, or targeted reconnaissance by exposing organizational personnel details. This is particularly relevant for organizations managing sensitive or confidential projects where user identity exposure could indirectly lead to further attacks. The vulnerability does not compromise system integrity or availability, so operational disruption is unlikely. However, in sectors with strict privacy regulations such as GDPR, even limited personal data exposure can have compliance implications and reputational consequences. Organizations using OpenProject for project management should assess the sensitivity of their user data and the potential for misuse of exposed information. The risk is mitigated by the requirement for authenticated access, limiting exposure to insiders or compromised accounts.
Mitigation Recommendations
The primary mitigation is to upgrade OpenProject installations to version 16.6.2 or later, where the vulnerability is patched. For organizations unable to upgrade immediately, applying the official patch manually is recommended to restrict access to user full names. Additionally, organizations should enforce strong authentication controls to reduce the risk of unauthorized access by low-privileged users. Monitoring and logging API usage and user profile access patterns can help detect automated enumeration attempts. Limiting user permissions to the minimum necessary and reviewing user roles regularly will reduce the attack surface. Educating users about social engineering risks stemming from exposed user information can further mitigate downstream impacts. Finally, organizations should review their privacy policies and ensure compliance with data protection regulations regarding the exposure of personal data.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2026-22602: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in opf openproject
Description
OpenProject is an open-source, web-based project management software. Prior to version 16.6.2, a low‑privileged logged-in user can view the full names of other users. Since user IDs are assigned sequentially and predictably (e.g., 1 to 1000), an attacker can extract a complete list of all users’ full names by iterating through these URLs. The same behavior can also be reproduced via the OpenProject API, allowing automated retrieval of full names through the API as well. This issue has been patched in version 16.6.2. Those who are unable to upgrade may apply the patch manually.
AI-Powered Analysis
Technical Analysis
CVE-2026-22602 is an information disclosure vulnerability classified under CWE-200 affecting OpenProject, an open-source web-based project management tool. In versions prior to 16.6.2, a low-privileged authenticated user can access the full names of other users by exploiting the predictable sequential assignment of user IDs. Since user IDs increment sequentially (e.g., 1 to 1000), an attacker can iterate through user profile URLs or use the OpenProject API to automate the retrieval of all users’ full names. This exposure occurs because the system does not sufficiently restrict access to user identity information based on privilege levels. The vulnerability requires the attacker to be logged in with at least low privileges and some user interaction, but no elevated permissions are necessary. The vulnerability does not allow access to sensitive credentials or other personal data beyond full names, nor does it permit modification or disruption of the system. The issue has been addressed in OpenProject version 16.6.2, which restricts access to user information appropriately. Organizations unable to upgrade can apply the patch manually. There are no known exploits in the wild at this time, and the CVSS v3.1 base score is 3.5, reflecting low severity due to limited impact and exploitation complexity.
Potential Impact
For European organizations, the primary impact of CVE-2026-22602 is the unauthorized disclosure of user full names within OpenProject environments. While full names alone may seem low risk, they can facilitate social engineering, spear-phishing, or targeted reconnaissance by exposing organizational personnel details. This is particularly relevant for organizations managing sensitive or confidential projects where user identity exposure could indirectly lead to further attacks. The vulnerability does not compromise system integrity or availability, so operational disruption is unlikely. However, in sectors with strict privacy regulations such as GDPR, even limited personal data exposure can have compliance implications and reputational consequences. Organizations using OpenProject for project management should assess the sensitivity of their user data and the potential for misuse of exposed information. The risk is mitigated by the requirement for authenticated access, limiting exposure to insiders or compromised accounts.
Mitigation Recommendations
The primary mitigation is to upgrade OpenProject installations to version 16.6.2 or later, where the vulnerability is patched. For organizations unable to upgrade immediately, applying the official patch manually is recommended to restrict access to user full names. Additionally, organizations should enforce strong authentication controls to reduce the risk of unauthorized access by low-privileged users. Monitoring and logging API usage and user profile access patterns can help detect automated enumeration attempts. Limiting user permissions to the minimum necessary and reviewing user roles regularly will reduce the attack surface. Educating users about social engineering risks stemming from exposed user information can further mitigate downstream impacts. Finally, organizations should review their privacy policies and ensure compliance with data protection regulations regarding the exposure of personal data.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-07T21:50:39.533Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6961b006ed32c7f018eb8fdd
Added to database: 1/10/2026, 1:48:54 AM
Last enriched: 1/10/2026, 2:01:51 AM
Last updated: 1/10/2026, 9:00:39 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.