CVE-2026-30236
Information Disclosure in OpenProject Budget Module via Insufficient User Validation
Publication date: 2026-03-11
Last updated on: 2026-03-13
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openproject | openproject | to 17.2.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-30236 is a moderate severity vulnerability in OpenProject versions prior to 17.2.0. When editing a project budget and planning labor costs, the system does not verify if the user included in the budget is actually a member of the project.
This flaw allows unauthorized users to access the default global hourly rate of non-project members, which should be confidential. Additionally, the API endpoint that pre-calculates labor costs for frontend previews also fails to validate project membership, enabling cost calculations using default rates of non-members.
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': "This vulnerability impacts confidentiality by exposing sensitive information about users' default hourly rates to unauthorized users who are not project members."}, {'type': 'paragraph', 'content': 'It requires low privileges and no user interaction, and can be exploited remotely over the network.'}, {'type': 'paragraph', 'content': 'The vulnerability does not affect the integrity or availability of the system.'}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to upgrade OpenProject to version 17.2.0 or later, where the issue has been fixed.