CVE-2026-27723

4.3 MEDIUM

📋 TL;DR

OpenProject versions before 17.0.5 and 17.1.2 contain an improper authentication vulnerability that allows attackers to create wiki pages in projects they shouldn't have access to. This affects all OpenProject installations running vulnerable versions. The issue stems from insufficient access controls on wiki page creation requests.

💻 Affected Systems

Products:
  • OpenProject
Versions: All versions before 17.0.5 and 17.1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All OpenProject deployments with wiki functionality enabled are affected. The vulnerability requires an attacker to have some level of authenticated access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could create malicious wiki pages in sensitive projects, potentially embedding phishing links, malware, or inappropriate content that appears legitimate to project members.

🟠

Likely Case

Unauthorized users create wiki pages in projects they shouldn't access, potentially leaking sensitive information or disrupting project workflows through inappropriate content.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized wiki creation attempts would be blocked and logged for investigation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but bypasses project-level permissions. The advisory suggests the vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 17.0.5 or 17.1.2

Vendor Advisory: https://github.com/opf/openproject/security/advisories/GHSA-9gc6-3xjq-pwc9

Restart Required: Yes

Instructions:

1. Backup your OpenProject installation and database. 2. Update to OpenProject 17.0.5 (for 17.0.x branch) or 17.1.2 (for 17.1.x branch). 3. Restart the OpenProject service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable Wiki Module

all

Temporarily disable wiki functionality until patching is possible

# Modify OpenProject configuration to disable wiki module
# Specific commands depend on installation method (Docker, package, source)

Restrict User Permissions

all

Tighten user permissions to minimize attack surface

# Review and restrict user roles and permissions in OpenProject admin interface
# Ensure users only have necessary project access

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized wiki page creation attempts
  • Disable wiki functionality for non-essential projects and users

🔍 How to Verify

Check if Vulnerable:

Check OpenProject version via admin interface or by examining the application metadata. Versions below 17.0.5 or 17.1.2 are vulnerable.

Check Version:

Check OpenProject admin dashboard or run appropriate command based on installation method (e.g., docker inspect, package manager query, or check application files)

Verify Fix Applied:

After updating, verify the version shows 17.0.5 or 17.1.2 or higher. Test that authenticated users cannot create wiki pages in projects they lack permissions for.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized wiki creation attempts in application logs
  • Wiki page creation events from users without proper project permissions

Network Indicators:

  • HTTP POST requests to wiki creation endpoints from unauthorized users

SIEM Query:

source="openproject.log" AND "wiki" AND "create" AND user NOT IN [authorized_users_for_project]

🔗 References

📤 Share & Export