Impact
The vulnerability in OpenProject allows a user to include a non‑member in a project budget or preview calculation without the system verifying that the user is actually a member of the project. As a result, the system exposes the default hourly rate of the non‑member, leaking individualized cost information. This weakness is classified as CWE‑863, a missing permission check that permits unauthorized data exposure.
Affected Systems
All OpenProject deployments running a version earlier than 17.2.0 are susceptible. This includes both self‑hosted and cloud‑hosted installations that use the project budget editing or preview features.
Risk and Exploitability
The CVSS score of 4.3 indicates low severity, and the EPSS score is below 1%, suggesting a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers who have authenticated access to budget editing or preview endpoints and the appropriate permissions can supply the identifier of a non‑member user to retrieve that user’s default rate, thereby compromising confidential cost data.
OpenCVE Enrichment