Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22600: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in opf openproject

0
Critical
VulnerabilityCVE-2026-22600cvecve-2026-22600cwe-200
Published: Sat Jan 10 2026 (01/10/2026, 01:06:00 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

OpenProject is an open-source, web-based project management software. A Local File Read (LFR) vulnerability exists in the work package PDF export functionality of OpenProject prior to version 16.6.4. By uploading a specially crafted SVG file (disguised as a PNG) as a work package attachment, an attacker can exploit the backend image processing engine (ImageMagick). When the work package is exported to PDF, the backend attempts to resize the image, triggering the ImageMagick text: coder. This allows an attacker to read arbitrary local files that the application user has permissions to access (e.g., /etc/passwd, all project configuration files, private project data, etc.). The attack requires permissions to upload attachments to a container that can be exported to PDF, such as a work package. The issue has been patched in version 16.6.4. Those who are unable to upgrade may apply the patch manually.

AI-Powered Analysis

AILast updated: 01/10/2026, 02:00:54 UTC

Technical Analysis

CVE-2026-22600 is a critical vulnerability in OpenProject, an open-source web-based project management software, affecting versions prior to 16.6.4. The flaw resides in the work package PDF export functionality, where the backend uses ImageMagick to process images attached to work packages. An attacker with permission to upload attachments can craft a malicious SVG file disguised as a PNG. When the work package is exported to PDF, ImageMagick attempts to resize the image and processes the embedded 'text:' coder, which can be manipulated to read arbitrary local files on the server. This Local File Read (LFR) vulnerability allows exposure of sensitive files such as /etc/passwd, project configuration files, and private project data accessible by the application user. Exploitation requires the attacker to have upload permissions but does not require user interaction beyond that. The vulnerability has a CVSS v3.1 score of 9.1, reflecting network attack vector, low complexity, privileges required, no user interaction, and a scope change with high confidentiality impact, low integrity impact, and low availability impact. No known exploits are reported in the wild yet. The vendor patched the vulnerability in OpenProject version 16.6.4, and manual patching is possible for users unable to upgrade immediately. This vulnerability highlights the risks of unsafe image processing and the importance of strict input validation and permission controls in collaborative software platforms.

Potential Impact

For European organizations, this vulnerability poses a significant risk of sensitive information disclosure, including internal project data and system files, which could lead to further attacks such as privilege escalation or lateral movement within networks. Organizations relying on OpenProject for project management, especially in sectors like government, finance, healthcare, and critical infrastructure, may face data breaches impacting confidentiality and compliance with data protection regulations such as GDPR. The ability to read arbitrary files can expose credentials, configuration files, and proprietary information, undermining trust and operational security. Since exploitation requires upload permissions, insider threats or compromised user accounts increase risk. The scope of affected systems includes all OpenProject installations running versions prior to 16.6.4, which may be widespread in European enterprises and public sector entities using open-source project management tools. The critical severity and network exploitability mean attackers can remotely leverage this vulnerability without user interaction, increasing the urgency for mitigation.

Mitigation Recommendations

1. Immediately upgrade OpenProject installations to version 16.6.4 or later where the vulnerability is patched. 2. If upgrading is not feasible, apply the vendor-provided manual patch to the affected code handling image processing in PDF exports. 3. Restrict upload permissions strictly to trusted users and roles; audit and minimize who can upload attachments to work packages. 4. Implement file type validation and scanning on uploaded files to detect and block malicious SVG or disguised files. 5. Monitor logs for unusual PDF export activities or suspicious file uploads indicative of exploitation attempts. 6. Consider isolating the OpenProject server environment and limiting file system permissions to reduce the impact of any file read attempts. 7. Educate users about the risks of uploading untrusted files and enforce strong access controls. 8. Regularly review and update security policies related to third-party software and open-source components. 9. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect exploitation patterns targeting ImageMagick vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-07T21:50:39.533Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961b006ed32c7f018eb8fd5

Added to database: 1/10/2026, 1:48:54 AM

Last enriched: 1/10/2026, 2:00:54 AM

Last updated: 1/10/2026, 6:52:24 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats