2026-02-06 22:10CVE-2026-25764GitHub_M
PUBLISHED5.2CWE-80

OpenProject vulnerable to Stored HTML injection

OpenProject is an open-source, web-based project management software. Prior to versions 16.6.7 and 17.0.3, an HTML injection vulnerability occurs in the time tracking function of OpenProject. The application does not escape HTML tags, an attacker with administrator privileges can create a work package with the name containing the HTML tags and add it to the Work package section when creating time tracking. This issue has been patched in versions 16.6.7 and 17.0.3.

Problem type

Affected products

opf

openproject

< 16.6.7 - AFFECTED

< 17.0.3 - AFFECTED

References

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-25764
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-25764",
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "dateUpdated": "2026-02-06T22:10:09.715Z",
    "dateReserved": "2026-02-05T18:35:52.358Z",
    "datePublished": "2026-02-06T22:10:09.715Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M",
        "dateUpdated": "2026-02-06T22:10:09.715Z"
      },
      "title": "OpenProject vulnerable to Stored HTML injection",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenProject is an open-source, web-based project management software. Prior to versions 16.6.7 and 17.0.3, an HTML injection vulnerability occurs in the time tracking function of OpenProject. The application does not escape HTML tags, an attacker with administrator privileges can create a work package with the name containing the HTML tags and add it to the Work package section when creating time tracking. This issue has been patched in versions 16.6.7 and 17.0.3."
        }
      ],
      "affected": [
        {
          "vendor": "opf",
          "product": "openproject",
          "versions": [
            {
              "version": "< 16.6.7",
              "status": "affected"
            },
            {
              "version": "< 17.0.3",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
              "cweId": "CWE-80",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://github.com/opf/openproject/security/advisories/GHSA-q523-c695-h3hp",
          "name": "https://github.com/opf/openproject/security/advisories/GHSA-q523-c695-h3hp",
          "tags": [
            "x_refsource_CONFIRM"
          ]
        },
        {
          "url": "https://github.com/opf/openproject/releases/tag/v16.6.7",
          "name": "https://github.com/opf/openproject/releases/tag/v16.6.7",
          "tags": [
            "x_refsource_MISC"
          ]
        },
        {
          "url": "https://github.com/opf/openproject/releases/tag/v17.0.3",
          "name": "https://github.com/opf/openproject/releases/tag/v17.0.3",
          "tags": [
            "x_refsource_MISC"
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L",
            "attackVector": "NETWORK",
            "attackComplexity": "LOW",
            "privilegesRequired": "HIGH",
            "userInteraction": "REQUIRED",
            "scope": "UNCHANGED",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "availabilityImpact": "LOW",
            "baseScore": 3.5,
            "baseSeverity": "LOW"
          }
        }
      ]
    }
  }
}