Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23721: CWE-862: Missing Authorization in opf openproject

0
Medium
VulnerabilityCVE-2026-23721cvecve-2026-23721cwe-862
Published: Mon Jan 19 2026 (01/19/2026, 17:52:35 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

CVE-2026-23721 is a medium severity vulnerability in OpenProject, an open-source project management tool. The flaw involves missing authorization checks allowing users with 'View Members' permission in any project to enumerate all groups and see their members, even if they shouldn't have access. This issue affects OpenProject versions prior to 16. 6. 5 and version 17. 0. 0, and has been fixed in versions 16. 6. 5 and 17. 0.

AI-Powered Analysis

AILast updated: 01/26/2026, 20:11:44 UTC

Technical Analysis

CVE-2026-23721 is a missing authorization vulnerability (CWE-862) in OpenProject, a widely used open-source web-based project management software. The vulnerability arises from a failed permission check related to group membership visibility. In OpenProject, groups are used to manage users across projects, and group members should only be visible to users who have the 'View Members' permission in projects where the group is a member. However, in versions prior to 16.6.5 and specifically version 17.0.0, any user with 'View Members' permission in any project could enumerate all groups and view all members of those groups, regardless of whether they had permission in those specific groups or projects. This unauthorized enumeration leaks potentially sensitive information about user memberships and organizational structure. The vulnerability requires the attacker to be authenticated with at least 'View Members' permission in any project, but no further user interaction is required. The flaw does not allow modification or deletion of data, nor does it impact system availability. The issue was addressed and fixed in OpenProject versions 16.6.5 and 17.0.1 by correcting the permission checks to restrict group member visibility appropriately. There are no known workarounds, and no exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 4.3 (medium), reflecting the limited impact on confidentiality and the requirement for authenticated access.

Potential Impact

For European organizations, the primary impact of CVE-2026-23721 is the unauthorized disclosure of user group membership information within OpenProject. This could lead to increased risk of targeted social engineering or spear-phishing attacks by revealing internal team structures and user roles. While the vulnerability does not allow data modification or system disruption, the leakage of membership data can compromise confidentiality and potentially aid attackers in reconnaissance phases of an attack. Organizations with strict data privacy requirements, such as those governed by GDPR, may face compliance risks if sensitive user information is exposed. The impact is more pronounced in organizations where OpenProject is used extensively for managing sensitive projects or where group membership reflects sensitive organizational hierarchies. Since exploitation requires authenticated access with 'View Members' permission, the risk is limited to insiders or compromised accounts but remains significant in environments with many users having this permission. The absence of known exploits reduces immediate risk but does not eliminate the need for prompt remediation.

Mitigation Recommendations

European organizations should immediately upgrade OpenProject installations to version 16.6.5 or 17.0.1 or later, where the vulnerability is fixed. Until upgrades are applied, organizations should audit user permissions to minimize the number of users granted 'View Members' permission, restricting it only to those who absolutely require it. Implement strict access controls and monitor for unusual access patterns to group membership data. Employ multi-factor authentication (MFA) to reduce the risk of account compromise that could lead to exploitation. Regularly review and update group memberships and permissions to ensure least privilege principles are enforced. Additionally, consider network segmentation and application-layer firewalls to limit access to OpenProject instances. Maintain up-to-date logging and alerting to detect any attempts to enumerate groups or access sensitive user information. Since no workarounds exist, patching remains the most effective mitigation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-15T15:45:01.955Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696e73e1d302b072d9cff0ad

Added to database: 1/19/2026, 6:11:45 PM

Last enriched: 1/26/2026, 8:11:44 PM

Last updated: 2/6/2026, 2:57:58 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats