Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22605: CWE-284: Improper Access Control in opf openproject

0
Medium
VulnerabilityCVE-2026-22605cvecve-2026-22605cwe-284
Published: Sat Jan 10 2026 (01/10/2026, 01:07:10 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

OpenProject is an open-source, web-based project management software. OpenProject versions prior to version 16.6.3, allowed users with the View Meetings permission on any project, to access meeting details of meetings that belonged to projects, the user does not have access to. This issue has been patched in version 16.6.3.

AI-Powered Analysis

AILast updated: 01/10/2026, 02:01:06 UTC

Technical Analysis

CVE-2026-22605 is an improper access control vulnerability classified under CWE-284, discovered in the open-source project management software OpenProject. The vulnerability affects all versions prior to 16.6.3. It arises because users granted the 'View Meetings' permission on any project can access meeting details from projects they are not authorized to view. This indicates a failure in enforcing project-level access restrictions on meeting data, allowing unauthorized information disclosure. The vulnerability does not require user interaction but does require the attacker to be authenticated with at least the 'View Meetings' permission on some project. The CVSS v3.1 base score is 4.3 (medium), reflecting low complexity of attack (AC:L), network vector (AV:N), privileges required (PR:L), no user interaction (UI:N), and limited impact on confidentiality only (C:L), with no impact on integrity or availability. No known exploits are currently reported in the wild. The issue was addressed in OpenProject version 16.6.3 by correcting the access control checks to ensure meeting details are only accessible to users with appropriate project permissions. This vulnerability could lead to unauthorized disclosure of sensitive meeting information, potentially exposing confidential project discussions or plans.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive project meeting information, which could include strategic plans, proprietary data, or personal information. Such exposure could lead to competitive disadvantage, reputational damage, or regulatory compliance issues, especially under GDPR if personal data is involved. Since OpenProject is used in various sectors including government, engineering, and IT, the impact could be significant where sensitive projects are managed. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. However, the confidentiality breach could facilitate further targeted attacks or insider threats. Organizations relying on OpenProject versions prior to 16.6.3 should consider this a moderate risk and prioritize remediation to prevent data leakage.

Mitigation Recommendations

The primary mitigation is to upgrade OpenProject installations to version 16.6.3 or later, where the access control flaw has been fixed. Organizations should audit current user permissions, especially the 'View Meetings' permission, to ensure it is granted only to trusted users who require it. Implement role-based access control (RBAC) policies to minimize excessive permissions. Additionally, monitor access logs for unusual meeting data access patterns that could indicate exploitation attempts. If immediate upgrade is not feasible, consider restricting network access to the OpenProject instance or isolating sensitive projects. Regularly review and update security policies related to project management tools. Finally, educate users about the importance of safeguarding meeting information and reporting suspicious activity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-07T21:50:39.533Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961b006ed32c7f018eb8fef

Added to database: 1/10/2026, 1:48:54 AM

Last enriched: 1/10/2026, 2:01:06 AM

Last updated: 1/10/2026, 8:40:36 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats