Description
REVA is an interoperability platform. Prior to 2.42.3 and 2.40.3, a bug in the GRPC authorization middleware of the "Reva" component of OpenCloud allows a malicious user to bypass the scope verification of a public link. By exploiting this via the the "archiver" service this can be leveraged to create an archive (zip or tar-file) containing all resources that this creator of the public link has access to. This vulnerability is fixed in 2.42.3 and 2.40.3.
Published: 2026-02-06
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Authorization bypass that enables attackers to arbitrarily download all resources associated with a public link creator
Action: Apply Patch
AI Analysis

Impact

A fault in the GRPC authorization middleware of the Reva component lets a malicious user skip the scope check that protects public links. By targeting the archiver service, an attacker can generate a zip or tar file that contains every file and resource the public link creator can access. This grants the attacker unrestricted read access to the link owner's data, allowing wide‑scale data exfiltration and exposure of confidential material.

Affected Systems

The flaw affects the Reva interoperability platform from OpenCloud EU. Any deployment of Reva versions older than 2.42.3 or 2.40.3 that exposes public link functionality is vulnerable.

Risk and Exploitability

The CVSS score of 8.2 signals a high severity, while the EPSS score of less than 1% indicates a very low current likelihood of exploitation. The vulnerability is not reported in the CISA KEV catalog, suggesting no known active exploitation. Exploit requires only an attacker to supply a valid public link ID to the archiver service; no elevated privileges are needed. Once triggered, the attacker can repeatedly request archives to harvest all data linked to the public link creator.

Generated by OpenCVE AI on April 17, 2026 at 22:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Reva to version 2.42.3 or 2.40.3 (or later) to apply the fixed authorization check in the GRPC middleware.
  • If public link sharing is not essential, disable it to eliminate the attack surface.
  • Monitor archive creation logs for unusual activity and ensure that only authorized users and services can invoke the archiver function.

Generated by OpenCVE AI on April 17, 2026 at 22:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9j2f-3rj3-wgpg OpenCloud Reva has a Public Link Exploit
History

Tue, 24 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Heinlein
Heinlein opencloud Reva
CPEs cpe:2.3:a:heinlein:opencloud_reva:*:*:*:*:*:*:*:*
Vendors & Products Heinlein
Heinlein opencloud Reva

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Opencloud-eu
Opencloud-eu reva
Vendors & Products Opencloud-eu
Opencloud-eu reva

Fri, 06 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
Description REVA is an interoperability platform. Prior to 2.42.3 and 2.40.3, a bug in the GRPC authorization middleware of the "Reva" component of OpenCloud allows a malicious user to bypass the scope verification of a public link. By exploiting this via the the "archiver" service this can be leveraged to create an archive (zip or tar-file) containing all resources that this creator of the public link has access to. This vulnerability is fixed in 2.42.3 and 2.40.3.
Title REVA Public Link Exploit
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


Subscriptions

Heinlein Opencloud Reva
Opencloud-eu Reva
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-06T18:52:19.409Z

Reserved: 2026-01-19T18:49:20.657Z

Link: CVE-2026-23989

cve-icon Vulnrichment

Updated: 2026-02-06T18:52:10.574Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T19:16:08.470

Modified: 2026-02-24T20:57:55.337

Link: CVE-2026-23989

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:45:29Z

Weaknesses