Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22600: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in opf openproject

0
Critical
VulnerabilityCVE-2026-22600cvecve-2026-22600cwe-200
Published: Sat Jan 10 2026 (01/10/2026, 01:06:00 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

OpenProject is an open-source, web-based project management software. A Local File Read (LFR) vulnerability exists in the work package PDF export functionality of OpenProject prior to version 16.6.4. By uploading a specially crafted SVG file (disguised as a PNG) as a work package attachment, an attacker can exploit the backend image processing engine (ImageMagick). When the work package is exported to PDF, the backend attempts to resize the image, triggering the ImageMagick text: coder. This allows an attacker to read arbitrary local files that the application user has permissions to access (e.g., /etc/passwd, all project configuration files, private project data, etc.). The attack requires permissions to upload attachments to a container that can be exported to PDF, such as a work package. The issue has been patched in version 16.6.4. Those who are unable to upgrade may apply the patch manually.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:43:14 UTC

Technical Analysis

CVE-2026-22600 is a critical vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting OpenProject, an open-source web-based project management software. The flaw resides in the work package PDF export functionality prior to version 16.6.4. Specifically, the vulnerability arises from the backend image processing engine, ImageMagick, which is used to resize images during PDF export. An attacker with permission to upload attachments to a container (e.g., a work package) can upload a specially crafted SVG file disguised as a PNG. When the PDF export process triggers ImageMagick's text: coder feature to resize the image, it inadvertently allows the attacker to read arbitrary local files that the application user has access to. This can include sensitive files such as /etc/passwd, project configuration files, and private project data. The attack vector requires the attacker to have at least limited privileges (upload permissions) but does not require user interaction beyond the upload. The vulnerability impacts confidentiality severely, with some impact on integrity and availability due to potential exposure of sensitive data and disruption of normal operations. The issue has been addressed in OpenProject version 16.6.4, and users unable to upgrade can apply manual patches. No known exploits are currently reported in the wild, but the high CVSS score (9.1) indicates a critical risk.

Potential Impact

For European organizations, the impact of CVE-2026-22600 is significant due to the potential exposure of sensitive internal data, including project details, configuration files, and system information. This exposure can lead to further attacks such as privilege escalation, lateral movement, or targeted espionage. Organizations in sectors relying heavily on project management tools—such as government agencies, engineering firms, software development companies, and research institutions—may face confidentiality breaches that compromise intellectual property or sensitive operational data. The vulnerability could also undermine trust in collaborative environments and lead to regulatory compliance issues under GDPR if personal or sensitive data is exposed. Additionally, the ability to read arbitrary files may allow attackers to gather information for subsequent attacks, increasing the overall risk posture. The requirement for upload permissions limits the attack surface but does not eliminate risk, especially in environments with many users or third-party collaborators.

Mitigation Recommendations

European organizations using OpenProject should immediately upgrade to version 16.6.4 or later to remediate this vulnerability. If upgrading is not feasible, applying the official manual patch is essential. Administrators should audit and restrict upload permissions to trusted users only, minimizing the number of accounts that can upload attachments to exportable containers. Implement strict file type validation and scanning on uploaded files to detect and block malicious SVG files disguised as PNGs. Monitoring and logging of PDF export activities and attachment uploads can help detect suspicious behavior. Network segmentation and least privilege principles should be enforced to limit the impact of any successful exploitation. Additionally, organizations should review and harden ImageMagick configurations to disable or restrict the use of potentially dangerous coders like text: coder. Regular security assessments and penetration testing focusing on file upload functionalities can help identify similar risks proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-07T21:50:39.533Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961b006ed32c7f018eb8fd5

Added to database: 1/10/2026, 1:48:54 AM

Last enriched: 1/17/2026, 7:43:14 AM

Last updated: 2/7/2026, 1:39:52 AM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats