CVE-2026-40896: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in opf openproject
OpenProject is open-source, web-based project management software. Prior to version 17.3.0, a user with `manage_agendas` permission in any project can inject agenda items into meetings belonging to any other project on the instance — even projects they have no access to. No knowledge of the target project, meeting, or victim is required; the attacker can blindly spray items into every meeting on the instance by iterating sequential section IDs. Version 17.3.0 patches the issue.
AI Analysis
Technical Summary
CVE-2026-40896 is a time-of-check to time-of-use (TOCTOU) race condition vulnerability in OpenProject, an open-source project management software. Users granted the 'manage_agendas' permission in any project can exploit this flaw to inject agenda items into meetings of other projects on the same instance, even if they lack access rights to those projects. Exploitation requires no knowledge of target projects or meetings, enabling blind injection by iterating over sequential section IDs. This issue affects OpenProject versions before 17.3.0, which contains the fix.
Potential Impact
An attacker with limited permissions ('manage_agendas' in any project) can manipulate meetings in other projects by injecting agenda items without authorization. This compromises the integrity of meeting content across projects on the instance. There is no impact on confidentiality or availability reported. No known exploits in the wild have been documented.
Mitigation Recommendations
Upgrade OpenProject to version 17.3.0 or later, where this vulnerability is patched. Since the vendor advisory indicates the issue is fixed in 17.3.0, applying this official update is the recommended remediation. Patch status is confirmed by the version information; no additional temporary mitigations are specified.
CVE-2026-40896: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in opf openproject
Description
OpenProject is open-source, web-based project management software. Prior to version 17.3.0, a user with `manage_agendas` permission in any project can inject agenda items into meetings belonging to any other project on the instance — even projects they have no access to. No knowledge of the target project, meeting, or victim is required; the attacker can blindly spray items into every meeting on the instance by iterating sequential section IDs. Version 17.3.0 patches the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-40896 is a time-of-check to time-of-use (TOCTOU) race condition vulnerability in OpenProject, an open-source project management software. Users granted the 'manage_agendas' permission in any project can exploit this flaw to inject agenda items into meetings of other projects on the same instance, even if they lack access rights to those projects. Exploitation requires no knowledge of target projects or meetings, enabling blind injection by iterating over sequential section IDs. This issue affects OpenProject versions before 17.3.0, which contains the fix.
Potential Impact
An attacker with limited permissions ('manage_agendas' in any project) can manipulate meetings in other projects by injecting agenda items without authorization. This compromises the integrity of meeting content across projects on the instance. There is no impact on confidentiality or availability reported. No known exploits in the wild have been documented.
Mitigation Recommendations
Upgrade OpenProject to version 17.3.0 or later, where this vulnerability is patched. Since the vendor advisory indicates the issue is fixed in 17.3.0, applying this official update is the recommended remediation. Patch status is confirmed by the version information; no additional temporary mitigations are specified.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-15T16:37:22.766Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e64a4819fe3cd2cd0b954c
Added to database: 4/20/2026, 3:46:16 PM
Last enriched: 4/20/2026, 4:01:47 PM
Last updated: 4/21/2026, 6:40:13 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.