Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22604: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in opf openproject

0
Medium
VulnerabilityCVE-2026-22604cvecve-2026-22604cwe-200
Published: Sat Jan 10 2026 (01/10/2026, 01:07:02 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

OpenProject is an open-source, web-based project management software. For OpenProject versions from 11.2.1 to before 16.6.2, when sending a POST request to the /account/change_password endpoint with an arbitrary User ID as the password_change_user_id parameter, the resulting error page would show the username for the requested user. Since this endpoint is intended to be called without being authenticated, this allows to enumerate the user names of all accounts registered in an OpenProject instance. This issue has been patched in version 16.6.2.

AI-Powered Analysis

AILast updated: 01/10/2026, 02:01:21 UTC

Technical Analysis

CVE-2026-22604 is an information disclosure vulnerability classified under CWE-200 affecting OpenProject, an open-source web-based project management software. The issue exists in versions from 11.2.1 up to but not including 16.6.2. The vulnerability arises because the /account/change_password endpoint, which is accessible without authentication, accepts a POST request containing a password_change_user_id parameter. When an attacker submits an arbitrary user ID, the resulting error page reveals the username associated with that ID. This behavior allows an unauthenticated attacker to enumerate all usernames registered on the OpenProject instance. Username enumeration is a critical reconnaissance step that can facilitate further attacks such as credential stuffing, brute-force password attacks, or social engineering. The vulnerability does not require any privileges or user interaction, making it easier to exploit remotely. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges required, no user interaction, and limited impact confined to confidentiality. The vulnerability was publicly disclosed on January 10, 2026, and has been patched in OpenProject version 16.6.2. No known exploits have been reported in the wild to date. Organizations running affected versions should prioritize upgrading to the patched release to prevent potential exploitation.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality. The exposure of valid usernames can enable attackers to perform targeted attacks such as phishing campaigns, credential stuffing, or brute-force password attempts, potentially leading to unauthorized access if weak or reused passwords are present. Organizations in sectors with sensitive project data, such as government, finance, healthcare, and critical infrastructure, may face increased risk if attackers leverage username enumeration to compromise accounts. Although the vulnerability does not directly impact system integrity or availability, the indirect consequences of account compromise can be severe, including data breaches and operational disruptions. Since OpenProject is used widely across Europe for project management, especially in public sector and enterprise environments, the scope of affected systems is significant. Prompt patching is essential to mitigate these risks. The lack of authentication requirement and ease of exploitation increase the likelihood of reconnaissance activities by attackers scanning for vulnerable instances.

Mitigation Recommendations

European organizations should immediately upgrade OpenProject installations to version 16.6.2 or later, where this vulnerability is patched. If immediate upgrading is not feasible, organizations should implement access controls to restrict unauthenticated access to the /account/change_password endpoint, such as web application firewalls (WAFs) with custom rules to block suspicious POST requests containing the password_change_user_id parameter. Monitoring and logging of access to this endpoint should be enhanced to detect enumeration attempts. Additionally, organizations should enforce strong password policies and multi-factor authentication (MFA) to reduce the risk of account compromise even if usernames are exposed. Security awareness training should include phishing and social engineering defenses, given the increased risk from username disclosure. Regular vulnerability scanning and penetration testing can help identify any residual exposure. Finally, organizations should maintain an inventory of OpenProject versions deployed across their environment to ensure timely patch management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-07T21:50:39.533Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6961b006ed32c7f018eb8fe9

Added to database: 1/10/2026, 1:48:54 AM

Last enriched: 1/10/2026, 2:01:21 AM

Last updated: 1/10/2026, 8:42:38 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats