Description
OpenProject is an open-source, web-based project management software. Prior to 17.0.2, users with the Manage Users permission can lock and unlock users. This functionality should only be possible for users of the application, but they were not supposed to be able to lock application administrators. Due to a missing permission check this logic was not enforced. The problem was fixed in OpenProject 17.0.2The problem was fixed in OpenProject 17.0.2.
Published: 2026-02-09
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Administrative Account Lockout
Action: Immediate Patch
AI Analysis

Impact

OpenProject, an open‑source project‑management platform, contains a flaw that permits any user granted the Manage Users permission to lock or unlock any account, including those belonging to application administrators. The missing permission check allows a legitimate user to disable administrative access, resulting in a denial of service for critical management functions. The weakness is a missing authorization check, identified as CWE‑862.

Affected Systems

The vulnerability affects OpenProject installations prior to version 17.0.2. Any role with Manage Users rights, regardless of other privileges, can target administrator accounts. Versions 17.0.2 and later have the fix in place.

Risk and Exploitability

The CVSS score of 6.7 indicates moderate severity, while the EPSS score of less than 1 % reflects a very low probability of exploitation in the wild. The issue is not listed in the CISA KEV catalog. Exploitation requires a legitimate user with Manage Users rights, so an attacker would typically be an insider or one who has gained such permissions. Although it does not enable remote code execution, it permits administrative lock‑out, which can disrupt project‑management operations.

Generated by OpenCVE AI on April 18, 2026 at 13:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to OpenProject 17.0.2 or later to apply the vendor patch.
  • Revoke the Manage Users permission from any users who do not require it, ensuring only trusted personnel retain account‑management rights.
  • Continuously audit lock/unlock activity logs and set alerts for repeated lock attempts on administrator accounts to detect potential abuse.

Generated by OpenCVE AI on April 18, 2026 at 13:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Openproject
Openproject openproject
CPEs cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*
Vendors & Products Openproject
Openproject openproject

Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Opf
Opf openproject
Vendors & Products Opf
Opf openproject

Mon, 09 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
Description OpenProject is an open-source, web-based project management software. Prior to 17.0.2, users with the Manage Users permission can lock and unlock users. This functionality should only be possible for users of the application, but they were not supposed to be able to lock application administrators. Due to a missing permission check this logic was not enforced. The problem was fixed in OpenProject 17.0.2The problem was fixed in OpenProject 17.0.2.
Title OpenProject has Improper Access Control on User Management allows user managers to lock admin accounts
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H'}


Subscriptions

Openproject Openproject
Opf Openproject
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-09T19:14:26.197Z

Reserved: 2026-01-26T21:06:47.869Z

Link: CVE-2026-24777

cve-icon Vulnrichment

Updated: 2026-02-09T19:14:21.379Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T19:15:50.200

Modified: 2026-02-11T18:28:40.220

Link: CVE-2026-24777

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses