Description
OpenProject is an open-source, web-based project management software. Prior to version 17.2.3, the =n operator in modules/reporting/lib/report/operator.rb:177 embeds user input directly into SQL WHERE clauses without parameterization. This issue has been patched in version 17.2.3.
Published: 2026-04-02
Score: 9.9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Data Compromise via SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in OpenProject’s cost reporting module. The =n operator in modules/reporting/lib/report/operator.rb embeds user‑supplied text directly into SQL WHERE clauses without parameterization, creating a classic SQL injection flaw (CWE‑89). An attacker who controls this input could inject arbitrary SQL, potentially reading, modifying, or deleting sensitive project data or even executing privileged database commands, thereby compromising confidentiality, integrity, and availability.

Affected Systems

Any OpenProject installation running a version older than 17.2.3 is susceptible. The security team has released a patch in release 17.2.3 that eliminates the vulnerable code. Administrators should verify the current version and upgrade promptly; no later versions are known to retain the flaw.

Risk and Exploitability

The flaw is scored as CVSS 9.9, indicating a high‑severity risk. EPSS information is not provided, and the issue is not yet listed in CISA’s Known Exploited Vulnerabilities catalog, suggesting limited evidence of active exploitation. The likely attack vector is remote, via the web interface, and the cost‑reporting functionality may be accessible without authentication, making the condition for exploitation straightforward. Once an attacker supplies crafted input to the =n operator, they can manipulate the database query to achieve the outcomes described above.

Generated by OpenCVE AI on April 2, 2026 at 22:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official OpenProject patch to version 17.2.3 or later
  • Disable or restrict access to the cost‑reporting interface until the upgrade is complete
  • Verify that no other components consume unsanitized input in similar patterns
  • Monitor database logs for unusual query activity after deployment

Generated by OpenCVE AI on April 2, 2026 at 22:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Opf
Opf openproject
Vendors & Products Opf
Opf openproject

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description OpenProject is an open-source, web-based project management software. Prior to version 17.2.3, the =n operator in modules/reporting/lib/report/operator.rb:177 embeds user input directly into SQL WHERE clauses without parameterization. This issue has been patched in version 17.2.3.
Title OpenProject: SQL Injection in Cost Reporting =n Operator via parse_number_string
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T13:01:53.483Z

Reserved: 2026-03-30T18:41:20.753Z

Link: CVE-2026-34717

cve-icon Vulnrichment

Updated: 2026-04-03T13:01:48.435Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-02T18:16:33.083

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-34717

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:17:07Z

Weaknesses