CVE-2026-23989

8.2 HIGH

📋 TL;DR

This vulnerability in REVA's GRPC authorization middleware allows attackers to bypass scope verification on public links. Malicious users can exploit this via the archiver service to create archives containing all resources accessible to the public link creator. Organizations using affected REVA versions in OpenCloud deployments are impacted.

💻 Affected Systems

Products:
  • OpenCloud REVA
Versions: All versions prior to 2.42.3 and 2.40.3
Operating Systems: Any OS running REVA
Default Config Vulnerable: ⚠️ Yes
Notes: Affects REVA component of OpenCloud when public links feature is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete data exfiltration of all resources accessible to any user who creates public links, potentially including sensitive organizational data.

🟠

Likely Case

Unauthorized access to files and resources through public links, leading to data leakage and privacy violations.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, but still represents an authorization bypass vulnerability.

🌐 Internet-Facing: HIGH - Public links are typically internet-accessible, making exploitation straightforward if vulnerable systems are exposed.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this to access resources beyond their intended permissions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a malicious user account with ability to create public links, but the bypass itself is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.42.3 or 2.40.3

Vendor Advisory: https://github.com/opencloud-eu/reva/security/advisories/GHSA-9j2f-3rj3-wgpg

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Update REVA to version 2.42.3 or 2.40.3 using your package manager or from source. 3. Restart REVA services. 4. Verify the fix by testing public link functionality.

🔧 Temporary Workarounds

Disable public links

all

Temporarily disable the public links feature to prevent exploitation while patching.

Modify REVA configuration to disable public sharing functionality

Restrict archiver service

all

Limit access to the archiver service to trusted users only.

Configure access controls for archiver service endpoints

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate REVA instances from sensitive data stores
  • Enable detailed logging and monitoring for archiver service usage and public link creation

🔍 How to Verify

Check if Vulnerable:

Check REVA version: if running version <2.42.3 (for 2.42.x branch) or <2.40.3 (for 2.40.x branch), system is vulnerable.

Check Version:

reva version or check REVA service logs for version information

Verify Fix Applied:

After patching, test public link creation and archiver functionality to ensure scope verification works correctly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual archiver service requests
  • Public link creation followed by archive operations
  • Authorization failures in GRPC middleware logs

Network Indicators:

  • Multiple archive requests from single user in short timeframe
  • Large data transfers from archiver service

SIEM Query:

source="reva" AND ("archiver" OR "public.link") AND status="success" | stats count by user, resource

🔗 References

📤 Share & Export