Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-23646
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-19 Jan, 2026 | 17:48
Updated At-20 Jan, 2026 | 14:54
Rejected At-
▼CVE Numbering Authority (CNA)
OpenProject users can delete other user's session, causing them to be logged out

OpenProject is an open-source, web-based project management software. Users of OpenProject versions prior to 16.6.5 and 17.0.1 have the ability to view and end their active sessions via Account Settings → Sessions. When deleting a session, it was not properly checked if the session belongs to the user. As the ID that is used to identify these session objects use incremental integers, users could iterate requests using `DELETE /my/sessions/:id` and thus unauthenticate other users. Users did not have access to any sensitive information (like browser identifier, IP addresses, etc) of other users that are stored in the session. The problem was patched in OpenProject versions 16.6.5 and 17.0.1. No known workarounds are available as this does not require any permissions or other that can temporarily be disabled.

Affected Products
Vendor
opf
Product
openproject
Versions
Affected
  • < 16.6.5
  • = 17.0.0
Problem Types
TypeCWE IDDescription
CWECWE-488CWE-488: Exposure of Data Element to Wrong Session
Type: CWE
CWE ID: CWE-488
Description: CWE-488: Exposure of Data Element to Wrong Session
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/opf/openproject/security/advisories/GHSA-w422-xf8f-v4vp
x_refsource_CONFIRM
https://github.com/opf/openproject/releases/tag/v16.6.5
x_refsource_MISC
https://github.com/opf/openproject/releases/tag/v17.0.1
x_refsource_MISC
Hyperlink: https://github.com/opf/openproject/security/advisories/GHSA-w422-xf8f-v4vp
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/opf/openproject/releases/tag/v16.6.5
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opf/openproject/releases/tag/v17.0.1
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found