CVE-2026-30236

Source
https://cve.org/CVERecord?id=CVE-2026-30236
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-30236.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-30236
Aliases
  • GHSA-p747-569x-3v3f
Published
2026-03-11T16:25:07.893Z
Modified
2026-04-10T05:41:46.926480Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
OpenProject users that are not project members can be used to calculate Labor Budget, leaking their global hourly rate
Details

OpenProject is an open-source, web-based project management software. Prior to 17.2.0, when editing a project budget and planning the labor cost, it was not checked that the user that was planned in the budget is actually a project member. This exposed the user's default rate (if one was set up) to users that should only see that information for project members. Also, the endpoint that handles the pre-calculation for the frontend to display a preview of the costs, while it was being entered, did not properly validate the membership of the user as well. This also allowed to calculate costs with the default rate of non-members. This vulnerability is fixed in 17.2.0.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/30xxx/CVE-2026-30236.json",
    "cwe_ids": [
        "CWE-863"
    ]
}
References

Affected packages

Git / github.com/opf/openproject

Affected ranges

Type
GIT
Repo
https://github.com/opf/openproject
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v17.*
v17.0.0
v17.0.1
v17.0.2
v17.0.3
v17.0.4
v17.0.5
v17.1.0
v17.1.1
v17.1.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-30236.json"