Description
OpenProject is an open-source, web-based project management software. Prior to 17.2.0, this vulnerability occurs due to improper validation of OpenProject’s Markdown rendering, specifically in the hyperlink handling. This allows an attacker to inject malicious hyperlink payloads that perform DOM clobbering. DOM clobbering can crash or blank the entire page by overwriting native DOM functions with HTML elements, causing critical JavaScript calls to throw runtime errors during application initialization and halt further execution. This vulnerability is fixed in 17.2.0.
Published: 2026-03-11
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

OpenProject’s markdown renderer fails to properly validate hyperlink payloads prior to version 17.2.0. The flaw permits an attacker to embed malicious hyperlinks that exploit DOM clobbering, which can overwrite native browser DOM functions with injected HTML elements. Key weakness identified as CWE‑79 (XSS via DOM clobbering). When an injection occurs, the application’s JavaScript execution is interrupted, resulting in a full page crash or blank screen and halting further application logic.

Affected Systems

Affected systems are installations of the open‑source, web‑based project management software OpenProject, provided by the vendor opf. All versions published before the 17.2.0 release are susceptible; the issue was resolved in the 17.2.0 patch.

Risk and Exploitability

The CVSS score is 6.5, indicating moderate severity. EPSS is less than 1 %, suggesting the probability of exploitation is low. The vulnerability is not catalogued in CISA’s KEV list. Exploitation would require an attacker able to inject markdown content—such as a user with content author privileges—into the application. Once a proper payload is inserted, the DOM clobbering triggers a runtime error during initialization, leading to a denial of service. No publicly documented exploit exists yet, but the flaw is classified as a medium‑risk issue.

Generated by OpenCVE AI on March 17, 2026 at 15:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenProject to version 17.2.0 or later

Generated by OpenCVE AI on March 17, 2026 at 15:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Openproject
Openproject openproject
CPEs cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*
Vendors & Products Openproject
Openproject openproject

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Opf
Opf openproject
Vendors & Products Opf
Opf openproject

Wed, 11 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description OpenProject is an open-source, web-based project management software. Prior to 17.2.0, this vulnerability occurs due to improper validation of OpenProject’s Markdown rendering, specifically in the hyperlink handling. This allows an attacker to inject malicious hyperlink payloads that perform DOM clobbering. DOM clobbering can crash or blank the entire page by overwriting native DOM functions with HTML elements, causing critical JavaScript calls to throw runtime errors during application initialization and halt further execution. This vulnerability is fixed in 17.2.0.
Title Business Logic Error on OpenProject through hyperlinks in markdown using DOM clobbering
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Openproject Openproject
Opf Openproject
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T17:16:17.329Z

Reserved: 2026-03-04T17:23:59.798Z

Link: CVE-2026-30235

cve-icon Vulnrichment

Updated: 2026-03-11T17:16:07.177Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T17:16:57.470

Modified: 2026-03-13T19:22:16.667

Link: CVE-2026-30235

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:30:40Z

Weaknesses