Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24776: CWE-639: Authorization Bypass Through User-Controlled Key in opf openproject

0
Medium
VulnerabilityCVE-2026-24776cvecve-2026-24776cwe-639
Published: Fri Feb 06 2026 (02/06/2026, 17:56:11 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

OpenProject is an open-source, web-based project management software. Prior to 17.0.2, the drag&drop handler moving an agenda item to a different section was not properly checking if the target meeting section is part of the same meeting (or is the backlog, in case of recurring meetings). This allowed an attacker to move a meeting agenda item into a different meeting. The attacker did not get access to meetings, but they could add arbitrary agenda items, that could cause confusions. The vulnerability is fixed in 17.0.2.

AI-Powered Analysis

AILast updated: 02/06/2026, 18:30:55 UTC

Technical Analysis

CVE-2026-24776 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting OpenProject, an open-source web-based project management tool. The flaw exists in the drag-and-drop handler responsible for moving agenda items between meeting sections. Specifically, prior to version 17.0.2, the software failed to verify that the target meeting section belonged to the same meeting or was the backlog in recurring meetings. This improper validation allowed an authenticated attacker with permission to move agenda items to relocate them into different meetings arbitrarily. While the attacker does not gain access to the content of other meetings or escalate privileges, they can insert misleading or irrelevant agenda items, potentially causing confusion and disrupting meeting workflows. The vulnerability requires the attacker to be authenticated (PR:L) but does not require user interaction beyond that. The attack vector is network-based (AV:N), and the complexity is low (AC:L). The CVSS v3.1 base score is 4.3, indicating medium severity, with impact limited to integrity (I:L) and no impact on confidentiality or availability. No known exploits are currently in the wild. The issue was resolved in OpenProject version 17.0.2 by adding proper validation checks to ensure agenda items can only be moved within the same meeting or to the backlog as appropriate.

Potential Impact

For European organizations using OpenProject, this vulnerability can lead to operational disruptions by allowing unauthorized modification of meeting agendas. While it does not expose sensitive data or allow privilege escalation, the ability to insert arbitrary agenda items into unrelated meetings can cause confusion, miscommunication, and potential delays in decision-making processes. This is particularly impactful for organizations relying heavily on OpenProject for coordinating complex projects and meetings, such as government agencies, large enterprises, and collaborative research institutions. The integrity of meeting content is compromised, which could indirectly affect project outcomes or compliance with internal governance. Since exploitation requires authentication, insider threats or compromised user accounts pose the greatest risk. The vulnerability does not affect system availability or confidentiality directly but undermines trust in meeting management workflows.

Mitigation Recommendations

European organizations should promptly upgrade OpenProject installations to version 17.0.2 or later, where the vulnerability is fixed. Until patching is possible, administrators should restrict drag-and-drop permissions for agenda items to trusted users only and monitor meeting agenda changes for unusual activity. Implementing strict access controls and auditing user actions related to meeting management can help detect and prevent exploitation. Additionally, organizations should enforce strong authentication mechanisms and monitor for compromised accounts to reduce the risk of insider exploitation. Training users to recognize and report suspicious agenda modifications can further mitigate operational impact. Regularly reviewing OpenProject release notes and security advisories will ensure timely awareness of similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-26T21:06:47.869Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69862fadf9fa50a62f2569ae

Added to database: 2/6/2026, 6:15:09 PM

Last enriched: 2/6/2026, 6:30:55 PM

Last updated: 2/7/2026, 12:54:53 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats