Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-24777
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-09 Feb, 2026 | 19:15
Updated At-11 Feb, 2026 | 18:28

OpenProject is an open-source, web-based project management software. Prior to 17.0.2, users with the Manage Users permission can lock and unlock users. This functionality should only be possible for users of the application, but they were not supposed to be able to lock application administrators. Due to a missing permission check this logic was not enforced. The problem was fixed in OpenProject 17.0.2The problem was fixed in OpenProject 17.0.2.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.7MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
CPE Matches

openproject
openproject
>>openproject>>Versions before 17.0.2(exclusive)
cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-862Primarysecurity-advisories@github.com
CWE ID: CWE-862
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/opf/openproject/releases/tag/v17.0.2security-advisories@github.com
Release Notes
https://github.com/opf/openproject/security/advisories/GHSA-fq66-cwg6-qq69security-advisories@github.com
Vendor Advisory
Hyperlink: https://github.com/opf/openproject/releases/tag/v17.0.2
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/opf/openproject/security/advisories/GHSA-fq66-cwg6-qq69
Source: security-advisories@github.com
Resource:
Vendor Advisory
Change History
0Changes found

Details not found