Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24775: CWE-345: Insufficient Verification of Data Authenticity in opf openproject

0
Medium
VulnerabilityCVE-2026-24775cvecve-2026-24775cwe-345
Published: Wed Jan 28 2026 (01/28/2026, 18:10:46 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

OpenProject is an open-source, web-based project management software. In the new editor for collaborative documents based on BlockNote, OpenProject maintainers added a custom extension in OpenProject version 17.0.0 that allows to mention OpenProject work packages in the document. To show work package details, the editor loads details about the work package via the OpenProject API. For this API call, the extension to the BlockNote editor did not properly validate the given work package ID to be only a number. This allowed an attacker to generate a document with relative links that upon opening could make arbitrary `GET` requests to any URL within the OpenProject instance. This issue was patched in version version 0.0.22 of op-blocknote-extensions, which was shipped with OpenProject 17.0.2. If users cannot update immediately to version 17.0.2 of OpenProject, administrators can disable collaborative document editing in Settings -> Documents -> Real time collaboration -> Disable.

AI-Powered Analysis

AILast updated: 01/28/2026, 18:35:32 UTC

Technical Analysis

OpenProject is an open-source web-based project management tool that introduced a new collaborative document editor based on BlockNote in version 17.0.0. This editor includes a custom extension allowing users to mention OpenProject work packages within documents. To display work package details, the extension makes API calls to the OpenProject backend, passing the work package ID as a parameter. However, the extension failed to properly validate that the work package ID was strictly numeric, allowing an attacker to inject crafted relative URLs instead of valid numeric IDs. When a user opens a document containing such malicious relative links, the editor triggers arbitrary GET requests to any URL within the OpenProject instance. This can be exploited to perform unauthorized internal API calls, potentially manipulating or disrupting internal data or services. The vulnerability is classified under CWE-345 (Insufficient Verification of Data Authenticity), indicating a failure to properly verify input authenticity before use. The CVSS 3.1 base score is 6.3 (medium severity), reflecting that exploitation requires network access, low complexity, privileges (limited user), and user interaction (opening the document). The impact affects integrity and availability but not confidentiality. The issue was patched in the op-blocknote-extensions version 0.0.22, shipped with OpenProject 17.0.2, by enforcing numeric validation on work package IDs. Until organizations can upgrade, administrators can disable the real-time collaborative document editing feature to mitigate exploitation risk.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity and availability of project management data within OpenProject instances. Attackers with limited user privileges can craft documents that, when opened, cause the system to make arbitrary internal GET requests, potentially leading to unauthorized data manipulation, disruption of project workflows, or triggering unintended system behaviors. Although confidentiality is not directly compromised, the ability to interfere with internal API calls can undermine trust in project data accuracy and availability. Organizations relying heavily on OpenProject for collaborative project management, especially those with sensitive or critical project data, may experience operational disruptions. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with many users sharing documents. The vulnerability could be leveraged in targeted attacks or insider threat scenarios to cause internal service disruptions or data integrity issues.

Mitigation Recommendations

1. Upgrade OpenProject to version 17.0.2 or later, which includes the patched op-blocknote-extensions 0.0.22 with proper input validation. 2. If immediate upgrading is not feasible, disable the collaborative document editing feature by navigating to Settings -> Documents -> Real time collaboration and selecting Disable. 3. Implement strict access controls to limit who can create or edit collaborative documents, reducing the risk of malicious document creation. 4. Educate users to be cautious when opening documents from untrusted sources within OpenProject. 5. Monitor OpenProject API logs for unusual GET requests or patterns indicative of exploitation attempts. 6. Consider network segmentation or application-layer firewalls to restrict internal API access where possible. 7. Regularly audit OpenProject instances for version compliance and configuration to ensure timely application of security patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-26T21:06:47.869Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697a538a4623b1157ce16565

Added to database: 1/28/2026, 6:20:58 PM

Last enriched: 1/28/2026, 6:35:32 PM

Last updated: 1/28/2026, 8:51:39 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats