CVE-2026-23646: CWE-488: Exposure of Data Element to Wrong Session in opf openproject
OpenProject is an open-source, web-based project management software. Users of OpenProject versions prior to 16.6.5 and 17.0.1 have the ability to view and end their active sessions via Account Settings → Sessions. When deleting a session, it was not properly checked if the session belongs to the user. As the ID that is used to identify these session objects use incremental integers, users could iterate requests using `DELETE /my/sessions/:id` and thus unauthenticate other users. Users did not have access to any sensitive information (like browser identifier, IP addresses, etc) of other users that are stored in the session. The problem was patched in OpenProject versions 16.6.5 and 17.0.1. No known workarounds are available as this does not require any permissions or other that can temporarily be disabled.
AI Analysis
Technical Summary
CVE-2026-23646 is a vulnerability classified under CWE-488 (Exposure of Data Element to Wrong Session) affecting OpenProject, an open-source web-based project management software. The flaw exists in versions prior to 16.6.5 and version 17.0.0, where users can view and manage their active sessions via the Account Settings interface. When a user attempts to delete a session using the DELETE /my/sessions/:id endpoint, the system fails to verify that the session ID belongs to the requesting user. Because session IDs are assigned as incremental integers, an authenticated user can iterate through session IDs and delete sessions belonging to other users, effectively forcing them to be logged out. Importantly, this vulnerability does not expose sensitive session data such as IP addresses or browser identifiers. The impact is primarily on availability, as it allows denial of service against user sessions. The vulnerability requires authentication but no additional privileges or user interaction. The issue was patched in OpenProject versions 16.6.5 and 17.0.1. There are no known workarounds, and no exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 6.5, reflecting medium severity with network attack vector, low attack complexity, and no confidentiality or integrity impact but high availability impact.
Potential Impact
For European organizations using vulnerable versions of OpenProject, this vulnerability poses a risk of denial of service against user sessions, potentially disrupting project management workflows and collaboration. Attackers with valid user credentials can forcibly log out other users, which could be exploited to cause operational interruptions or targeted disruption of key personnel. While no sensitive data is exposed, the forced session termination could lead to loss of unsaved work or hinder timely access to project resources. Organizations relying heavily on OpenProject for critical project coordination may experience productivity degradation. Additionally, repeated exploitation could erode user trust in the platform’s reliability. The impact is more pronounced in environments with many concurrent users or where session continuity is critical. Since exploitation requires authentication, insider threats or compromised accounts are the most likely vectors. The absence of known exploits reduces immediate risk, but the availability of incremental session IDs makes exploitation straightforward once credentials are obtained.
Mitigation Recommendations
European organizations should immediately upgrade OpenProject installations to version 16.6.5 or 17.0.1 or later, where the vulnerability is patched. As no workarounds exist, patching is the primary mitigation. Organizations should also enforce strong authentication controls to reduce the risk of credential compromise, including multi-factor authentication (MFA) where possible. Monitoring and alerting on unusual session deletion activity can help detect exploitation attempts. Limiting user permissions to only necessary roles may reduce the attack surface, although this vulnerability requires only authenticated user status. Regularly auditing session management logs and educating users about the risks of credential sharing can further mitigate risk. For environments where immediate patching is not feasible, consider isolating OpenProject access to trusted networks and employing web application firewalls (WAFs) to detect and block suspicious DELETE requests targeting session endpoints. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2026-23646: CWE-488: Exposure of Data Element to Wrong Session in opf openproject
Description
OpenProject is an open-source, web-based project management software. Users of OpenProject versions prior to 16.6.5 and 17.0.1 have the ability to view and end their active sessions via Account Settings → Sessions. When deleting a session, it was not properly checked if the session belongs to the user. As the ID that is used to identify these session objects use incremental integers, users could iterate requests using `DELETE /my/sessions/:id` and thus unauthenticate other users. Users did not have access to any sensitive information (like browser identifier, IP addresses, etc) of other users that are stored in the session. The problem was patched in OpenProject versions 16.6.5 and 17.0.1. No known workarounds are available as this does not require any permissions or other that can temporarily be disabled.
AI-Powered Analysis
Technical Analysis
CVE-2026-23646 is a vulnerability classified under CWE-488 (Exposure of Data Element to Wrong Session) affecting OpenProject, an open-source web-based project management software. The flaw exists in versions prior to 16.6.5 and version 17.0.0, where users can view and manage their active sessions via the Account Settings interface. When a user attempts to delete a session using the DELETE /my/sessions/:id endpoint, the system fails to verify that the session ID belongs to the requesting user. Because session IDs are assigned as incremental integers, an authenticated user can iterate through session IDs and delete sessions belonging to other users, effectively forcing them to be logged out. Importantly, this vulnerability does not expose sensitive session data such as IP addresses or browser identifiers. The impact is primarily on availability, as it allows denial of service against user sessions. The vulnerability requires authentication but no additional privileges or user interaction. The issue was patched in OpenProject versions 16.6.5 and 17.0.1. There are no known workarounds, and no exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 6.5, reflecting medium severity with network attack vector, low attack complexity, and no confidentiality or integrity impact but high availability impact.
Potential Impact
For European organizations using vulnerable versions of OpenProject, this vulnerability poses a risk of denial of service against user sessions, potentially disrupting project management workflows and collaboration. Attackers with valid user credentials can forcibly log out other users, which could be exploited to cause operational interruptions or targeted disruption of key personnel. While no sensitive data is exposed, the forced session termination could lead to loss of unsaved work or hinder timely access to project resources. Organizations relying heavily on OpenProject for critical project coordination may experience productivity degradation. Additionally, repeated exploitation could erode user trust in the platform’s reliability. The impact is more pronounced in environments with many concurrent users or where session continuity is critical. Since exploitation requires authentication, insider threats or compromised accounts are the most likely vectors. The absence of known exploits reduces immediate risk, but the availability of incremental session IDs makes exploitation straightforward once credentials are obtained.
Mitigation Recommendations
European organizations should immediately upgrade OpenProject installations to version 16.6.5 or 17.0.1 or later, where the vulnerability is patched. As no workarounds exist, patching is the primary mitigation. Organizations should also enforce strong authentication controls to reduce the risk of credential compromise, including multi-factor authentication (MFA) where possible. Monitoring and alerting on unusual session deletion activity can help detect exploitation attempts. Limiting user permissions to only necessary roles may reduce the attack surface, although this vulnerability requires only authenticated user status. Regularly auditing session management logs and educating users about the risks of credential sharing can further mitigate risk. For environments where immediate patching is not feasible, consider isolating OpenProject access to trusted networks and employing web application firewalls (WAFs) to detect and block suspicious DELETE requests targeting session endpoints. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential disruptions.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-14T16:08:37.484Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696e705dd302b072d9cf6544
Added to database: 1/19/2026, 5:56:45 PM
Last enriched: 1/19/2026, 6:11:30 PM
Last updated: 1/19/2026, 8:14:27 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23851: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan
HighCVE-2026-23850: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan
HighCVE-2026-1173: Denial of Service in birkir prime
MediumCVE-2026-23847: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in siyuan-note siyuan
LowCVE-2026-23846: CWE-598: Use of GET Request Method With Sensitive Query Strings in Quenary tugtainer
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.