CVE-2026-22605: CWE-284: Improper Access Control in opf openproject
OpenProject is an open-source, web-based project management software. OpenProject versions prior to version 16.6.3, allowed users with the View Meetings permission on any project, to access meeting details of meetings that belonged to projects, the user does not have access to. This issue has been patched in version 16.6.3.
AI Analysis
Technical Summary
CVE-2026-22605 is an improper access control vulnerability classified under CWE-284, discovered in the open-source project management software OpenProject. The vulnerability affects all versions prior to 16.6.3. It arises because users granted the 'View Meetings' permission on any project can access meeting details from projects they are not authorized to view. This indicates a failure in enforcing project-level access restrictions on meeting data, allowing unauthorized information disclosure. The vulnerability does not require user interaction but does require the attacker to be authenticated with at least the 'View Meetings' permission on some project. The CVSS v3.1 base score is 4.3 (medium), reflecting low complexity of attack (AC:L), network vector (AV:N), privileges required (PR:L), no user interaction (UI:N), and limited impact on confidentiality only (C:L), with no impact on integrity or availability. No known exploits are currently reported in the wild. The issue was addressed in OpenProject version 16.6.3 by correcting the access control checks to ensure meeting details are only accessible to users with appropriate project permissions. This vulnerability could lead to unauthorized disclosure of sensitive meeting information, potentially exposing confidential project discussions or plans.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive project meeting information, which could include strategic plans, proprietary data, or personal information. Such exposure could lead to competitive disadvantage, reputational damage, or regulatory compliance issues, especially under GDPR if personal data is involved. Since OpenProject is used in various sectors including government, engineering, and IT, the impact could be significant where sensitive projects are managed. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. However, the confidentiality breach could facilitate further targeted attacks or insider threats. Organizations relying on OpenProject versions prior to 16.6.3 should consider this a moderate risk and prioritize remediation to prevent data leakage.
Mitigation Recommendations
The primary mitigation is to upgrade OpenProject installations to version 16.6.3 or later, where the access control flaw has been fixed. Organizations should audit current user permissions, especially the 'View Meetings' permission, to ensure it is granted only to trusted users who require it. Implement role-based access control (RBAC) policies to minimize excessive permissions. Additionally, monitor access logs for unusual meeting data access patterns that could indicate exploitation attempts. If immediate upgrade is not feasible, consider restricting network access to the OpenProject instance or isolating sensitive projects. Regularly review and update security policies related to project management tools. Finally, educate users about the importance of safeguarding meeting information and reporting suspicious activity.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2026-22605: CWE-284: Improper Access Control in opf openproject
Description
OpenProject is an open-source, web-based project management software. OpenProject versions prior to version 16.6.3, allowed users with the View Meetings permission on any project, to access meeting details of meetings that belonged to projects, the user does not have access to. This issue has been patched in version 16.6.3.
AI-Powered Analysis
Technical Analysis
CVE-2026-22605 is an improper access control vulnerability classified under CWE-284, discovered in the open-source project management software OpenProject. The vulnerability affects all versions prior to 16.6.3. It arises because users granted the 'View Meetings' permission on any project can access meeting details from projects they are not authorized to view. This indicates a failure in enforcing project-level access restrictions on meeting data, allowing unauthorized information disclosure. The vulnerability does not require user interaction but does require the attacker to be authenticated with at least the 'View Meetings' permission on some project. The CVSS v3.1 base score is 4.3 (medium), reflecting low complexity of attack (AC:L), network vector (AV:N), privileges required (PR:L), no user interaction (UI:N), and limited impact on confidentiality only (C:L), with no impact on integrity or availability. No known exploits are currently reported in the wild. The issue was addressed in OpenProject version 16.6.3 by correcting the access control checks to ensure meeting details are only accessible to users with appropriate project permissions. This vulnerability could lead to unauthorized disclosure of sensitive meeting information, potentially exposing confidential project discussions or plans.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive project meeting information, which could include strategic plans, proprietary data, or personal information. Such exposure could lead to competitive disadvantage, reputational damage, or regulatory compliance issues, especially under GDPR if personal data is involved. Since OpenProject is used in various sectors including government, engineering, and IT, the impact could be significant where sensitive projects are managed. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. However, the confidentiality breach could facilitate further targeted attacks or insider threats. Organizations relying on OpenProject versions prior to 16.6.3 should consider this a moderate risk and prioritize remediation to prevent data leakage.
Mitigation Recommendations
The primary mitigation is to upgrade OpenProject installations to version 16.6.3 or later, where the access control flaw has been fixed. Organizations should audit current user permissions, especially the 'View Meetings' permission, to ensure it is granted only to trusted users who require it. Implement role-based access control (RBAC) policies to minimize excessive permissions. Additionally, monitor access logs for unusual meeting data access patterns that could indicate exploitation attempts. If immediate upgrade is not feasible, consider restricting network access to the OpenProject instance or isolating sensitive projects. Regularly review and update security policies related to project management tools. Finally, educate users about the importance of safeguarding meeting information and reporting suspicious activity.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-07T21:50:39.533Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6961b006ed32c7f018eb8fef
Added to database: 1/10/2026, 1:48:54 AM
Last enriched: 1/10/2026, 2:01:06 AM
Last updated: 1/10/2026, 8:40:36 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.