CVE-2026-24772: CWE-345: Insufficient Verification of Data Authenticity in opf openproject
OpenProject is an open-source, web-based project management software. To enable the real time collaboration on documents, OpenProject 17.0 introduced a synchronization server. The OpenPrioject backend generates an authentication token that is currently valid for 24 hours, encrypts it with a shared secret only known to the synchronization server. The frontend hands this encrypted token and the backend URL over to the synchronization server to check user's ability to work on the document and perform intermittent saves while editing. The synchronization server does not properly validate the backend URL and sends a request with the decrypted authentication token to the endpoint that was given to the server. An attacker could use this vulnerability to decrypt a token that he intercepted by other means to gain an access token to interact with OpenProject on the victim's behalf. This vulnerability was introduced with OpenProject 17.0.0 and was fixed in 17.0.2. As a workaround, disable the collaboration feature via Settings -> Documents -> Real time collaboration -> Disable. Additionally the `hocuspocus` container should also be disabled.
AI Analysis
Technical Summary
OpenProject is an open-source web-based project management tool that introduced a real-time collaboration feature in version 17.0. This feature relies on a synchronization server (implemented via the hocuspocus container) to enable collaborative document editing. The backend generates an authentication token valid for 24 hours, encrypts it with a shared secret known only to the synchronization server, and passes the encrypted token along with the backend URL to the synchronization server. The synchronization server then decrypts the token and sends a request to the provided backend URL to verify the user's permissions and allow document edits. The vulnerability (CWE-345: Insufficient Verification of Data Authenticity) arises because the synchronization server does not properly validate the backend URL before sending the decrypted token. An attacker who intercepts an encrypted token (via network interception or other means) can supply a malicious backend URL to the synchronization server, causing it to send the decrypted token to an attacker-controlled endpoint. This effectively leaks the authentication token, enabling the attacker to impersonate the victim and interact with OpenProject with their privileges. The vulnerability affects OpenProject versions from 17.0.0 up to but not including 17.0.2 and the corresponding hocuspocus container versions. The flaw was fixed in 17.0.2 by adding proper validation of the backend URL to ensure it is legitimate and trusted. Until patched, disabling the real-time collaboration feature and the hocuspocus container is recommended to mitigate risk. The CVSS 3.1 score of 8.9 reflects a high-severity issue with network attack vector, low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity with limited availability impact.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of project management data stored and managed within OpenProject. Unauthorized access via token theft can lead to data leakage, unauthorized document modifications, and potential disruption of project workflows. Organizations relying on OpenProject for sensitive or regulated projects (e.g., government, finance, healthcare, or critical infrastructure sectors) could face compliance violations and reputational damage if exploited. The ability for an attacker to impersonate legitimate users may also facilitate lateral movement within networks or further attacks on integrated systems. Since OpenProject is used widely across Europe in both public and private sectors, the impact could be broad, especially in environments where real-time collaboration is enabled and network interception is feasible (e.g., unsecured Wi-Fi, compromised internal networks). The limited availability impact reduces risk of denial-of-service but does not diminish the criticality of confidentiality and integrity breaches.
Mitigation Recommendations
1. Immediately upgrade OpenProject installations to version 17.0.2 or later, which contains the fix for this vulnerability. 2. If immediate patching is not possible, disable the real-time collaboration feature via Settings -> Documents -> Real time collaboration -> Disable. 3. Disable the hocuspocus container responsible for synchronization to prevent token leakage. 4. Restrict network access to the synchronization server and backend URLs to trusted hosts only, using firewall rules or network segmentation. 5. Monitor network traffic for unusual requests to backend URLs or unexpected external endpoints that could indicate exploitation attempts. 6. Implement TLS encryption for all communications to reduce risk of token interception. 7. Educate users about the risk of using OpenProject on untrusted networks and encourage use of VPNs. 8. Review and rotate shared secrets used for token encryption if compromise is suspected. 9. Conduct regular audits of OpenProject logs to detect anomalous access patterns or token misuse. 10. Coordinate with OpenProject support or community for updates and security advisories.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain, Poland, Austria
CVE-2026-24772: CWE-345: Insufficient Verification of Data Authenticity in opf openproject
Description
OpenProject is an open-source, web-based project management software. To enable the real time collaboration on documents, OpenProject 17.0 introduced a synchronization server. The OpenPrioject backend generates an authentication token that is currently valid for 24 hours, encrypts it with a shared secret only known to the synchronization server. The frontend hands this encrypted token and the backend URL over to the synchronization server to check user's ability to work on the document and perform intermittent saves while editing. The synchronization server does not properly validate the backend URL and sends a request with the decrypted authentication token to the endpoint that was given to the server. An attacker could use this vulnerability to decrypt a token that he intercepted by other means to gain an access token to interact with OpenProject on the victim's behalf. This vulnerability was introduced with OpenProject 17.0.0 and was fixed in 17.0.2. As a workaround, disable the collaboration feature via Settings -> Documents -> Real time collaboration -> Disable. Additionally the `hocuspocus` container should also be disabled.
AI-Powered Analysis
Technical Analysis
OpenProject is an open-source web-based project management tool that introduced a real-time collaboration feature in version 17.0. This feature relies on a synchronization server (implemented via the hocuspocus container) to enable collaborative document editing. The backend generates an authentication token valid for 24 hours, encrypts it with a shared secret known only to the synchronization server, and passes the encrypted token along with the backend URL to the synchronization server. The synchronization server then decrypts the token and sends a request to the provided backend URL to verify the user's permissions and allow document edits. The vulnerability (CWE-345: Insufficient Verification of Data Authenticity) arises because the synchronization server does not properly validate the backend URL before sending the decrypted token. An attacker who intercepts an encrypted token (via network interception or other means) can supply a malicious backend URL to the synchronization server, causing it to send the decrypted token to an attacker-controlled endpoint. This effectively leaks the authentication token, enabling the attacker to impersonate the victim and interact with OpenProject with their privileges. The vulnerability affects OpenProject versions from 17.0.0 up to but not including 17.0.2 and the corresponding hocuspocus container versions. The flaw was fixed in 17.0.2 by adding proper validation of the backend URL to ensure it is legitimate and trusted. Until patched, disabling the real-time collaboration feature and the hocuspocus container is recommended to mitigate risk. The CVSS 3.1 score of 8.9 reflects a high-severity issue with network attack vector, low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity with limited availability impact.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of project management data stored and managed within OpenProject. Unauthorized access via token theft can lead to data leakage, unauthorized document modifications, and potential disruption of project workflows. Organizations relying on OpenProject for sensitive or regulated projects (e.g., government, finance, healthcare, or critical infrastructure sectors) could face compliance violations and reputational damage if exploited. The ability for an attacker to impersonate legitimate users may also facilitate lateral movement within networks or further attacks on integrated systems. Since OpenProject is used widely across Europe in both public and private sectors, the impact could be broad, especially in environments where real-time collaboration is enabled and network interception is feasible (e.g., unsecured Wi-Fi, compromised internal networks). The limited availability impact reduces risk of denial-of-service but does not diminish the criticality of confidentiality and integrity breaches.
Mitigation Recommendations
1. Immediately upgrade OpenProject installations to version 17.0.2 or later, which contains the fix for this vulnerability. 2. If immediate patching is not possible, disable the real-time collaboration feature via Settings -> Documents -> Real time collaboration -> Disable. 3. Disable the hocuspocus container responsible for synchronization to prevent token leakage. 4. Restrict network access to the synchronization server and backend URLs to trusted hosts only, using firewall rules or network segmentation. 5. Monitor network traffic for unusual requests to backend URLs or unexpected external endpoints that could indicate exploitation attempts. 6. Implement TLS encryption for all communications to reduce risk of token interception. 7. Educate users about the risk of using OpenProject on untrusted networks and encourage use of VPNs. 8. Review and rotate shared secrets used for token encryption if compromise is suspected. 9. Conduct regular audits of OpenProject logs to detect anomalous access patterns or token misuse. 10. Coordinate with OpenProject support or community for updates and security advisories.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-26T21:06:47.868Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697a538a4623b1157ce16562
Added to database: 1/28/2026, 6:20:58 PM
Last enriched: 1/28/2026, 6:35:17 PM
Last updated: 1/28/2026, 8:51:23 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1533: SQL Injection in code-projects Online Music Site
MediumCVE-2026-1532: Path Traversal in D-Link DCS-700L
MediumCVE-2025-71006: n/a
UnknownCVE-2025-71005: n/a
MediumCVE-2025-71003: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.