Impact
OpenProject’s Repositories module did not properly escape filenames supplied by the repository. An attacker with push access can commit a file whose name contains HTML code that is rendered on the repositories page without sanitation. This results in a persisted cross‑site scripting (XSS) vulnerability that can execute arbitrary JavaScript in the browsers of all project members who view the affected page.
Affected Systems
Affected deployments are those running OpenProject versions before 16.6.9, before 17.0.6, before 17.1.3, or before 17.2.1. The product is identified by the vendor identifier opf:openproject and the CPE strings cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:* and cpe:2.3:a:openproject:openproject:17.2.0:*:*:*:*:*:*:*; any instance matching those version ranges is vulnerable.
Risk and Exploitability
The CVSS score of 9.1 categorises this flaw as high severity, yet the EPSS score is below 1 % and it is not listed in CISA’s KEV catalog. The vulnerability requires the attacker to possess push rights to the repository; after a malicious commit, any project member who accesses the repositories page will have the injected script executed. The potential impact is confined to the victim’s browser and does not require additional conditions beyond repository access.
OpenCVE Enrichment