Description
OpenProject is an open-source, web-based project management software. Prior to 17.2.0, when budgets are deleted, the work packages that were assigned to this budget need to be moved to a different budget. This action was performed before the permission check on the delete action was executed. This allowed all users in the application to delete work package budget assignments. This vulnerability is fixed in 17.2.0.
Published: 2026-03-11
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation: Users can delete budget assignments and reassign WorkPackages to other budgets
Action: Upgrade
AI Analysis

Impact

Prior to OpenProject version 17.2.0, the application performed the reassignment of WorkPackages to a new budget before validating the delete permissions. This permission‑check bypass exposed a capability that any authenticated user could exploit to delete budget assignments and transfer WorkPackages into arbitrary other budgets, thereby bypassing intended access controls and corrupting project data integrity. The weakness aligns with CWE‑863 (Incorrect Permission Assignment for Critical Functionality).

Affected Systems

The vulnerability affects OpenProject deployments with any version earlier than 17.2.0, as identified via the vendor identifier opf:openproject and the corresponding CPE string. It applies to all installations of the OpenProject web application that have the budgeting feature enabled. No specific sub‑versions are listed, so all builds prior to the 17.2.0 release are unpatched.

Risk and Exploitability

The CVSS base score of 6.5 indicates a moderate severity impact. The EPSS score of less than 1% suggests a low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is an authenticated web‑based interaction; any user with permission to view the application can perform the delete operation, as the description notes that “all users in the application” can trigger the bypass. Exploitation requires no special privilege beyond standard application access, making it relatively easy for malicious actors within an organization to corrupt budgeting data once they gain user credentials or have a compromised account.

Generated by OpenCVE AI on March 17, 2026 at 15:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenProject to version 17.2.0 or later where the permission check is correctly applied before budget deletion.

Generated by OpenCVE AI on March 17, 2026 at 15:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Openproject
Openproject openproject
CPEs cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*
Vendors & Products Openproject
Openproject openproject

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Opf
Opf openproject
Vendors & Products Opf
Opf openproject

Wed, 11 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description OpenProject is an open-source, web-based project management software. Prior to 17.2.0, when budgets are deleted, the work packages that were assigned to this budget need to be moved to a different budget. This action was performed before the permission check on the delete action was executed. This allowed all users in the application to delete work package budget assignments. This vulnerability is fixed in 17.2.0.
Title OpenProject has a Permission Check bypass on Budget deletion allows reassignment of WorkPackages into other budgets
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Openproject Openproject
Opf Openproject
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T17:12:12.088Z

Reserved: 2026-03-04T17:23:59.798Z

Link: CVE-2026-30239

cve-icon Vulnrichment

Updated: 2026-03-11T17:12:03.078Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T17:16:57.773

Modified: 2026-03-13T19:01:28.530

Link: CVE-2026-30239

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:30:33Z

Weaknesses