CVE-2026-30236
Received Received - Intake
Information Disclosure in OpenProject Budget Module via Insufficient User Validation

Publication date: 2026-03-11

Last updated on: 2026-03-13

Assigner: GitHub, Inc.

Description
OpenProject is an open-source, web-based project management software. Prior to 17.2.0, when editing a project budget and planning the labor cost, it was not checked that the user that was planned in the budget is actually a project member. This exposed the user's default rate (if one was set up) to users that should only see that information for project members. Also, the endpoint that handles the pre-calculation for the frontend to display a preview of the costs, while it was being entered, did not properly validate the membership of the user as well. This also allowed to calculate costs with the default rate of non-members. This vulnerability is fixed in 17.2.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-11
Last Modified
2026-03-13
Generated
2026-05-07
AI Q&A
2026-03-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openproject openproject to 17.2.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-30236 is a moderate severity vulnerability in OpenProject versions prior to 17.2.0. When editing a project budget and planning labor costs, the system does not verify if the user included in the budget is actually a member of the project.

This flaw allows unauthorized users to access the default global hourly rate of non-project members, which should be confidential. Additionally, the API endpoint that pre-calculates labor costs for frontend previews also fails to validate project membership, enabling cost calculations using default rates of non-members.


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability impacts confidentiality by exposing sensitive information about users' default hourly rates to unauthorized users who are not project members."}, {'type': 'paragraph', 'content': 'It requires low privileges and no user interaction, and can be exploited remotely over the network.'}, {'type': 'paragraph', 'content': 'The vulnerability does not affect the integrity or availability of the system.'}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade OpenProject to version 17.2.0 or later, where the issue has been fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart