CVE-2026-24772
Unknown Unknown - Not Provided
Authentication Token Decryption via URL Validation Flaw in OpenProject

Publication date: 2026-01-28

Last updated on: 2026-02-12

Assigner: GitHub, Inc.

Description
OpenProject is an open-source, web-based project management software. To enable the real time collaboration on documents, OpenProject 17.0 introduced a synchronization server. The OpenPrioject backend generates an authentication token that is currently valid for 24 hours, encrypts it with a shared secret only known to the synchronization server. The frontend hands this encrypted token and the backend URL over to the synchronization server to check user's ability to work on the document and perform intermittent saves while editing. The synchronization server does not properly validate the backend URL and sends a request with the decrypted authentication token to the endpoint that was given to the server. An attacker could use this vulnerability to decrypt a token that he intercepted by other means to gain an access token to interact with OpenProject on the victim's behalf. This vulnerability was introduced with OpenProject 17.0.0 and was fixed in 17.0.2. As a workaround, disable the collaboration feature via Settings -> Documents -> Real time collaboration -> Disable. Additionally the `hocuspocus` container should also be disabled.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-28
Last Modified
2026-02-12
Generated
2026-05-07
AI Q&A
2026-01-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openproject openproject From 17.0.0 (inc) to 17.0.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in OpenProject 17.0.0 where the synchronization server does not properly validate the backend URL. The backend generates an authentication token valid for 24 hours, encrypts it, and sends it to the synchronization server along with the backend URL. The server then decrypts the token and sends a request to the given backend URL without proper validation. An attacker who intercepts an encrypted token can exploit this flaw to decrypt the token and gain an access token to interact with OpenProject as the victim.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can gain unauthorized access to OpenProject on behalf of a victim by decrypting intercepted authentication tokens. This can lead to unauthorized actions such as accessing, modifying, or saving documents in real time collaboration, potentially compromising sensitive project data and user accounts.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, disable the collaboration feature by navigating to Settings -> Documents -> Real time collaboration and selecting Disable. Additionally, the 'hocuspocus' container should also be disabled. Also, ensure your OpenProject version is updated to 17.0.2 or later where the vulnerability is fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart