Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23989: CWE-863: Incorrect Authorization in opencloud-eu reva

0
High
VulnerabilityCVE-2026-23989cvecve-2026-23989cwe-863
Published: Fri Feb 06 2026 (02/06/2026, 18:28:25 UTC)
Source: CVE Database V5
Vendor/Project: opencloud-eu
Product: reva

Description

REVA is an interoperability platform. Prior to 2.42.3 and 2.40.3, a bug in the GRPC authorization middleware of the "Reva" component of OpenCloud allows a malicious user to bypass the scope verification of a public link. By exploiting this via the the "archiver" service this can be leveraged to create an archive (zip or tar-file) containing all resources that this creator of the public link has access to. This vulnerability is fixed in 2.42.3 and 2.40.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/06/2026, 19:14:30 UTC

Technical Analysis

CVE-2026-23989 is an authorization bypass vulnerability classified under CWE-863, found in the GRPC authorization middleware of the Reva component within the OpenCloud interoperability platform. Reva facilitates resource sharing and collaboration across cloud services. The vulnerability arises from improper scope verification on public links, which are intended to restrict access to specific resources. Due to a bug in the authorization middleware, an attacker can bypass these scope checks without authentication or user interaction. By leveraging the archiver service, the attacker can generate an archive (zip or tar) containing all resources that the public link creator has access to, effectively escalating access beyond intended limits. This unauthorized access compromises confidentiality by exposing potentially sensitive data. The vulnerability affects Reva versions earlier than 2.40.3 and versions from 2.41.0 up to but not including 2.42.3. The issue was addressed in versions 2.40.3 and 2.42.3 by correcting the scope verification logic in the GRPC middleware. The CVSS v3.1 base score is 8.2, indicating a high severity due to network exploitability, no required privileges, and no user interaction, with a significant impact on confidentiality and limited impact on integrity and availability. No public exploits have been reported, but the vulnerability's nature makes it a critical concern for organizations relying on Reva for secure resource sharing.

Potential Impact

For European organizations, this vulnerability poses a significant risk of unauthorized data disclosure. Since Reva is an interoperability platform used to share and manage resources across cloud environments, exploitation could lead to leakage of sensitive corporate or personal data, violating data protection regulations such as GDPR. The ability to archive all accessible resources via a public link bypasses intended access controls, increasing the risk of intellectual property theft, exposure of confidential business information, or personal data breaches. This could result in reputational damage, regulatory fines, and operational disruption. Organizations using affected versions of Reva in sectors like finance, healthcare, government, or critical infrastructure are particularly at risk due to the sensitivity of their data and the potential impact of unauthorized access. The network-based exploitability and lack of required privileges make this vulnerability attractive to remote attackers, increasing the urgency for mitigation.

Mitigation Recommendations

European organizations should immediately verify their Reva versions and upgrade to 2.40.3 or 2.42.3 or later to remediate the vulnerability. In environments where immediate patching is not feasible, organizations should restrict network access to the archiver service and GRPC endpoints to trusted internal networks only, using firewall rules or network segmentation. Implement strict monitoring and logging of public link creation and archiving activities to detect anomalous behavior indicative of exploitation attempts. Review and minimize the use of public links, applying the principle of least privilege to resource sharing. Employ additional access controls such as multi-factor authentication and IP whitelisting where possible to reduce unauthorized access risks. Conduct regular security audits and vulnerability scans focusing on OpenCloud components. Finally, educate users about the risks of public link sharing and enforce policies to limit exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-19T18:49:20.657Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69863a39f9fa50a62f278f63

Added to database: 2/6/2026, 7:00:09 PM

Last enriched: 2/6/2026, 7:14:30 PM

Last updated: 3/23/2026, 11:12:26 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses