OpenProject is an open-source, web-based project management software. Prior to 17.0.2, the drag&drop handler moving an agenda item to a different section was not properly checking if the target meeting section is part of the same meeting (or is the backlog, in case of recurring meetings). This allowed an attacker to move a meeting agenda item into a different meeting. The attacker did not get access to meetings, but they could add arbitrary agenda items, that could cause confusions. The vulnerability is fixed in 17.0.2.
References
| Link | Resource |
|---|---|
| https://github.com/opf/openproject/releases/tag/v17.0.2 | Release Notes |
| https://github.com/opf/openproject/security/advisories/GHSA-p9v8-w9ph-hqmf | Vendor Advisory |
Configurations
History
23 Feb 2026, 18:14
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:* | |
| First Time |
Openproject openproject
Openproject |
|
| References | () https://github.com/opf/openproject/releases/tag/v17.0.2 - Release Notes | |
| References | () https://github.com/opf/openproject/security/advisories/GHSA-p9v8-w9ph-hqmf - Vendor Advisory |
06 Feb 2026, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 18:15
Updated : 2026-02-23 18:14
NVD link : CVE-2026-24776
Mitre link : CVE-2026-24776
CVE.ORG link : CVE-2026-24776
JSON object : View
Products Affected
openproject
- openproject
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
