CVE-2026-24776

4.3 MEDIUM

📋 TL;DR

This vulnerability in OpenProject allows authenticated attackers to move meeting agenda items into different meetings they shouldn't have access to, potentially causing confusion by adding arbitrary agenda items. It affects OpenProject installations prior to version 17.0.2. Attackers need meeting access but can manipulate agenda items across meeting boundaries.

💻 Affected Systems

Products:
  • OpenProject
Versions: All versions prior to 17.0.2
Operating Systems: All platforms running OpenProject
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with meeting access; affects both standalone and enterprise deployments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could disrupt critical meetings by adding misleading or inappropriate agenda items, potentially causing operational confusion, wasted time, or reputational damage if sensitive meetings are affected.

🟠

Likely Case

Attackers with meeting access could cause minor confusion by moving agenda items between meetings, potentially disrupting meeting flow but without accessing sensitive content.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to minor meeting disruptions that can be quickly identified and corrected.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to at least one meeting; drag&drop functionality can be manipulated via web interface or API calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 17.0.2

Vendor Advisory: https://github.com/opf/openproject/security/advisories/GHSA-p9v8-w9ph-hqmf

Restart Required: Yes

Instructions:

1. Backup your OpenProject installation and database. 2. Update to OpenProject 17.0.2 or later using your package manager or deployment method. 3. Restart the OpenProject service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable drag&drop functionality

all

Temporarily disable the drag&drop feature for meeting agenda items via configuration or frontend modifications

Modify OpenProject configuration to disable agenda drag&drop functionality

Restrict meeting access

all

Tighten meeting access controls to limit which users can modify agenda items

Review and adjust meeting permissions in OpenProject administration panel

🧯 If You Can't Patch

  • Implement strict meeting access controls and audit all agenda modifications
  • Monitor meeting logs for unusual agenda item movements between different meetings

🔍 How to Verify

Check if Vulnerable:

Check OpenProject version; if version is below 17.0.2, the system is vulnerable if meetings feature is enabled.

Check Version:

openproject run bundle exec rails runner 'puts OpenProject::VERSION.to_s'

Verify Fix Applied:

After updating to 17.0.2 or later, test that agenda items cannot be moved to meetings the user doesn't have access to.

📡 Detection & Monitoring

Log Indicators:

  • Unusual agenda item modifications
  • Agenda items appearing in meetings where they weren't created
  • Multiple agenda moves between different meeting IDs

Network Indicators:

  • API calls to move agenda items with different meeting IDs in same request

SIEM Query:

source="openproject" AND (event="agenda_item_moved" OR event="agenda_item_updated") AND meeting_id_changed=true

🔗 References

📤 Share & Export