Impact
OpenProject contains a Local File Read flaw in the PDF export of work packages. An attacker who can upload attachments can craft an SVG file disguised as a PNG. When the work package is exported to PDF, ImageMagick resizes the injected image, triggering its text coder and allowing the attacker to read any local file the application process can access.
Affected Systems
All installations of OpenProject using ImageMagick for PDF export and running a version earlier than 16.6.4 are affected. The vulnerability is only exploitable if the user has permission to upload attachments to a work package that can later be exported to PDF.
Risk and Exploitability
The CVSS score is 9.1 and the EPSS estimation is below 1%, indicating low current exploitation probability. OpenProject is not listed in the CISA KEV catalog. The attack requires valid user credentials with attachment rights; no external network access is needed beyond the web interface. The impact would be read access to files such as /etc/passwd, configuration files, or private project data.
OpenCVE Enrichment