You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/release-notes/16-6-2/README.md
+35-1Lines changed: 35 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,9 +11,43 @@ release_date: 2025-12-02
11
11
Release date: 2025-12-02
12
12
13
13
We released OpenProject [OpenProject 16.6.2](https://community.openproject.org/versions/2243).
14
-
The release contains several bug fixes and we recommend updating to the newest version.
14
+
The release contains security relevant bug fixes and we strongly urge updating to the newest version.
15
15
Below you will find a complete list of all changes and bug fixes.
16
16
17
+
The reported vulnerabilities have been reported as part of a Pentest by [Mantodea Security GmbH](https://mantodeasecurity.de/).
18
+
Thank you for your cooperation and responsible disclosure of the vulnerabilities
19
+
20
+
### CVE-2026-22601 - Code Execution in E-Mail function
21
+
22
+
For OpenProject version 16.6.1 and below, a registered administrator can execute arbitrary command by configuring sendmail binary path and sending a test email.
23
+
24
+
This vulnerability was assigned to the CVE CVE-2026-22601.
25
+
For more information, please see the [GitHub Advisory GHSA-9vrv-7h26-c7jc)](https://github.com/opf/openproject/security/advisories/GHSA-9vrv-7h26-c7jc).
26
+
27
+
### CVE-2026-22602 - User Enumeration via User ID
28
+
29
+
A low‑privileged logged-in user can view the full names of other users. The full name corresponding to any arbitrary user ID can be retrieved via the following URL, even if the requesting account has only minimal permissions:
30
+
31
+
This vulnerability was assigned to the CVE CVE-2026-22602.
32
+
For more information, please see the [GitHub Advisory GHSA-7fvx-9h6h-g82j](https://github.com/opf/openproject/security/advisories/GHSA-7fvx-9h6h-g82j).
33
+
34
+
35
+
### CVE-2026-22603 - No protection against brute-force attacks in the Change Password function
36
+
37
+
OpenProject’s unauthenticated password-change endpoint (/account/change_password) was not protected by the same brute-force safeguards that apply to the normal login form.
38
+
In affected versions, an attacker who can guess or enumerate user IDs can send unlimited password-change requests for a given account without triggering lockout or other rate-limiting controls.
39
+
40
+
This vulnerability was assigned to the CVE CVE-2026-22603.
41
+
For more information, please see the [GitHub Advisory GHSA-93x5-prx9-x239](https://github.com/opf/openproject/security/advisories/GHSA-93x5-prx9-x239).
42
+
43
+
### CVE-2026-22604 - User enumeration via the change password function
44
+
45
+
When sending a POST request to the /account/change_password endpoint with an arbitrary User ID as the password_change_user_id parameter, the resulting error page would show the username for the requested user. Since this endpoint is intended to be called without being authenticated, this allows to enumerate the user names of all accounts registered in an OpenProject instance.
46
+
47
+
This vulnerability was assigned to the CVE CVE-2026-22604.
48
+
For more information, please see the [GitHub Advisory GHSA-q7qp-p3vw-j2fh](https://github.com/opf/openproject/security/advisories/GHSA-q7qp-p3vw-j2fh).
Copy file name to clipboardExpand all lines: docs/release-notes/16-6-3/README.md
+10-1Lines changed: 10 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,9 +11,18 @@ release_date: 2025-12-11
11
11
Release date: 2025-12-11
12
12
13
13
We released OpenProject [OpenProject 16.6.3](https://community.openproject.org/versions/2247).
14
-
The release contains several bug fixes and we recommend updating to the newest version.
14
+
The release contains security relevant bug fixes and we strongly urge updating to the newest version.
15
15
Below you will find a complete list of all changes and bug fixes.
16
16
17
+
### CVE-2026-22605 - Insecure Direct Object Reference in Meetings
18
+
19
+
OpenProject versions <= 16.6.2 allows users with the View Meetings permission on any project, to access meeting agenda and section titles, notes, and text outcomes of meetings that belonged to projects, the user does not have access to. Linked work packages to projects the user is not allowed to see, are not affected.
20
+
21
+
This vulnerability was assigned to the CVE CVE-2026-22605.
22
+
For more information, please see the [GitHub Advisory GHSA-fq4m-pxvm-8x2j](https://github.com/opf/openproject/security/advisories/GHSA-fq4m-pxvm-8x2j).
23
+
24
+
This vulnerability was reported as part of the [YesWeHack.com OpenProject Bug Bounty program](https://yeswehack.com/programs/openproject), sponsored by the European Commission.
0 commit comments