Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9j2f-3rj3-wgpg | OpenCloud Reva has a Public Link Exploit |
Tue, 24 Feb 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Heinlein
Heinlein opencloud Reva |
|
| CPEs | cpe:2.3:a:heinlein:opencloud_reva:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Heinlein
Heinlein opencloud Reva |
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opencloud-eu
Opencloud-eu reva |
|
| Vendors & Products |
Opencloud-eu
Opencloud-eu reva |
Fri, 06 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Feb 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | REVA is an interoperability platform. Prior to 2.42.3 and 2.40.3, a bug in the GRPC authorization middleware of the "Reva" component of OpenCloud allows a malicious user to bypass the scope verification of a public link. By exploiting this via the the "archiver" service this can be leveraged to create an archive (zip or tar-file) containing all resources that this creator of the public link has access to. This vulnerability is fixed in 2.42.3 and 2.40.3. | |
| Title | REVA Public Link Exploit | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-06T18:52:19.409Z
Reserved: 2026-01-19T18:49:20.657Z
Link: CVE-2026-23989
Updated: 2026-02-06T18:52:10.574Z
Status : Analyzed
Published: 2026-02-06T19:16:08.470
Modified: 2026-02-24T20:57:55.337
Link: CVE-2026-23989
No data.
OpenCVE Enrichment
Updated: 2026-04-17T22:45:29Z
Github GHSA