Description
OpenProject is an open-source, web-based project management software. Prior to versions 16.6.7 and 17.0.3, an HTML injection vulnerability occurs in the time tracking function of OpenProject. The application does not escape HTML tags, an attacker with administrator privileges can create a work package with the name containing the HTML tags and add it to the Work package section when creating time tracking. This issue has been patched in versions 16.6.7 and 17.0.3.
Published: 2026-02-06
Score: 3.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: Stored HTML Injection
Action: Apply Patch
AI Analysis

Impact

The flaw allows an administrator to insert arbitrary HTML tags into the name of a work package used in time tracking. Because OpenProject does not escape these tags, the injected code is rendered when other users view the time‑tracking list, enabling client‑side code execution in the victim’s browser. This can be used to steal session data, deface pages, or serve malware. The weakness is a classic Stored XSS scenario, reflected in CWE‑80.

Affected Systems

OpenProject built by opf:openproject is affected. Versions earlier than 16.6.7 and earlier than 17.0.3 contain the underlying vulnerability; those releases rely on the time‑tracking feature that does not sanitize input.

Risk and Exploitability

The exploit requires administrative access to create a malicious work package; thus the attack surface is limited to privileged users. The CVSS score of 3.5 indicates low overall severity, while the EPSS score of below 1% implies a very low probability of commercial exploitation. The issue is not currently listed in the CISA KEV catalog, suggesting no widespread active weaponized attacks at the time of this assessment. Nonetheless, compromised administrator credentials could facilitate a user‑side XSS injection that compromises the integrity and confidentiality of user sessions.

Generated by OpenCVE AI on April 17, 2026 at 22:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenProject to version 16.6.7 or 17.0.3, or later, which includes proper escaping of HTML tags in work‑package names used for time tracking.
  • Limit administrative privileges to users who must manage work packages, reducing the number of accounts capable of injecting malicious content.
  • Implement a review or validation step that ensures HTML is correctly escaped in any user‑provided text fields before rendering.

Generated by OpenCVE AI on April 17, 2026 at 22:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*

Mon, 09 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Openproject
Openproject openproject
Vendors & Products Openproject
Openproject openproject

Fri, 06 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenProject is an open-source, web-based project management software. Prior to versions 16.6.7 and 17.0.3, an HTML injection vulnerability occurs in the time tracking function of OpenProject. The application does not escape HTML tags, an attacker with administrator privileges can create a work package with the name containing the HTML tags and add it to the Work package section when creating time tracking. This issue has been patched in versions 16.6.7 and 17.0.3.
Title OpenProject vulnerable to Stored HTML injection
Weaknesses CWE-80
References
Metrics cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L'}


Subscriptions

Openproject Openproject
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-09T15:26:40.309Z

Reserved: 2026-02-05T18:35:52.358Z

Link: CVE-2026-25764

cve-icon Vulnrichment

Updated: 2026-02-09T15:19:17.029Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T22:16:12.560

Modified: 2026-02-13T19:04:45.490

Link: CVE-2026-25764

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:30:29Z

Weaknesses