CVE-2026-24775

6.3 MEDIUM

📋 TL;DR

OpenProject versions 17.0.0-17.0.1 contain a server-side request forgery (SSRF) vulnerability in the collaborative document editor. Attackers can craft documents with malicious work package IDs that trigger arbitrary GET requests to internal OpenProject endpoints. All OpenProject instances with collaborative document editing enabled are affected.

💻 Affected Systems

Products:
  • OpenProject
Versions: 17.0.0 through 17.0.1
Operating Systems: all
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when collaborative document editing is enabled (default in affected versions).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive internal APIs, retrieve confidential data, or pivot to internal systems if OpenProject has network access to other services.

🟠

Likely Case

Unauthorized access to internal OpenProject API endpoints, potentially exposing work package details, user information, or project data.

🟢

If Mitigated

Limited impact with proper network segmentation and minimal internal API exposure.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires user to open a malicious document, but exploitation is straightforward once document is accessed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 17.0.2

Vendor Advisory: https://github.com/opf/openproject/security/advisories/GHSA-35c6-x276-2pvc

Restart Required: Yes

Instructions:

1. Update OpenProject to version 17.0.2 or later. 2. Restart the OpenProject service. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable collaborative document editing

all

Temporarily disable the vulnerable feature until patching is possible

Navigate to Settings -> Documents -> Real time collaboration -> Disable

🧯 If You Can't Patch

  • Disable collaborative document editing immediately
  • Implement network segmentation to limit OpenProject's internal network access

🔍 How to Verify

Check if Vulnerable:

Check OpenProject version via web interface or command line. Versions 17.0.0-17.0.1 are vulnerable.

Check Version:

openproject run bundle exec rails runner 'puts OpenProject::VERSION.to_s'

Verify Fix Applied:

Confirm OpenProject version is 17.0.2 or later and op-blocknote-extensions is version 0.0.22 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API requests from document editor
  • Requests to unexpected endpoints with work package IDs

Network Indicators:

  • Unusual internal API traffic patterns from OpenProject instance

SIEM Query:

source="openproject" AND (uri_path="/api/v3/work_packages/*" OR user_agent="BlockNote") AND status=200

🔗 References

📤 Share & Export