CVE-2026-24777

6.7 MEDIUM

📋 TL;DR

OpenProject versions before 17.0.2 contain a missing authorization vulnerability where users with 'Manage Users' permission can lock application administrators, which should be restricted. This allows privilege escalation and potential denial of service against administrative accounts. All OpenProject instances with users granted 'Manage Users' permission are affected.

💻 Affected Systems

Products:
  • OpenProject
Versions: All versions before 17.0.2
Operating Systems: All platforms running OpenProject
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects instances where users have been granted 'Manage Users' permission. Default installations may have this permission assigned to certain roles.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious user locks all administrators, causing complete loss of administrative access and potential service disruption until manual recovery.

🟠

Likely Case

Disgruntled employee or compromised account locks specific administrators to disrupt operations or facilitate further attacks.

🟢

If Mitigated

Limited impact if proper user permission reviews and monitoring are in place, with quick administrative recovery procedures.

🌐 Internet-Facing: MEDIUM - Requires authenticated user with specific permission, but internet-facing instances increase attack surface.
🏢 Internal Only: MEDIUM - Internal users with Manage Users permission can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple API/web interface call to lock user accounts.

Exploitation requires authenticated user with 'Manage Users' permission. No special tools or skills needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 17.0.2

Vendor Advisory: https://github.com/opf/openproject/security/advisories/GHSA-fq66-cwg6-qq69

Restart Required: Yes

Instructions:

1. Backup your OpenProject instance and database. 2. Update to OpenProject 17.0.2 using your package manager or deployment method. 3. Restart the OpenProject service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Remove Manage Users Permission

all

Temporarily remove 'Manage Users' permission from all non-administrative users until patching can be completed.

# Use OpenProject web interface: Admin -> Roles & Permissions -> Edit role -> Uncheck 'Manage Users'

🧯 If You Can't Patch

  • Implement strict user permission reviews and remove 'Manage Users' from unnecessary accounts
  • Enable detailed logging of user lock/unlock actions and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check OpenProject version via web interface (Admin -> Information) or command line. If version is below 17.0.2, system is vulnerable.

Check Version:

openproject run bundle exec rails runner "puts OpenProject::VERSION.to_s"

Verify Fix Applied:

After updating, verify version is 17.0.2 or higher and test that users with 'Manage Users' permission cannot lock administrators.

📡 Detection & Monitoring

Log Indicators:

  • User lock events targeting administrative accounts
  • Multiple lock attempts in short time period

Network Indicators:

  • API calls to user lock endpoints from non-administrative accounts

SIEM Query:

source="openproject" AND (event="user_locked" OR event="user_unlocked") AND target_user_role="admin"

🔗 References

📤 Share & Export