Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25763: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in opf openproject

0
Critical
VulnerabilityCVE-2026-25763cvecve-2026-25763cwe-78
Published: Fri Feb 06 2026 (02/06/2026, 22:10:13 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

OpenProject is an open-source, web-based project management software. Prior to versions 16.6.7 and 17.0.3, an arbitrary file write vulnerability exists in OpenProject’s repository changes endpoint (/projects/:project_id/repository/changes) when rendering the “latest changes” view via git log. By supplying a specially crafted rev value (for example, rev=--output=/tmp/poc.txt), an attacker can inject git log command-line options. When OpenProject executes the SCM command, Git interprets the attacker-controlled rev as an option and writes the output to an attacker-chosen path. As a result, any user with the :browse_repository permission on the project can create or overwrite arbitrary files that the OpenProject process user is permitted to write. The written contents consist of git log output, but by crafting custom commits the attacker can still upload valid shell scripts, ultimately leading to RCE. The RCE lets the attacker create a reverse shell to the target host and view confidential files outside of OpenProject, such as /etc/passwd. This issue has been patched in versions 16.6.7 and 17.0.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 12:13:25 UTC

Technical Analysis

OpenProject, an open-source web-based project management tool, suffered from a critical OS command injection vulnerability (CVE-2026-25763) affecting versions before 16.6.7 and 17.0.3. The flaw exists in the repository changes endpoint (/projects/:project_id/repository/changes) when rendering the 'latest changes' view using the git log command. Specifically, the 'rev' parameter is not properly sanitized, allowing an attacker to inject arbitrary git log command-line options. For example, by supplying 'rev=--output=/tmp/poc.txt', an attacker can direct git log to write output to an arbitrary file path. Since the OpenProject process user has write permissions to certain paths, this leads to an arbitrary file write vulnerability. By crafting git commits with malicious content, the attacker can upload shell scripts, enabling remote code execution (RCE). This RCE allows attackers to spawn reverse shells and access sensitive files such as /etc/passwd, compromising confidentiality and system integrity. Exploitation requires authenticated users with the 'browse_repository' permission but no further user interaction. The vulnerability was assigned a CVSS 4.0 score of 9.4, indicating critical severity due to network exploitability, no required user interaction, and high impact on confidentiality, integrity, and availability. The issue was patched in OpenProject versions 16.6.7 and 17.0.3.

Potential Impact

European organizations using vulnerable OpenProject versions face significant risks including unauthorized remote code execution, data exfiltration, and potential full system compromise. Attackers with limited repository browsing permissions can escalate privileges by injecting malicious commands, leading to reverse shells and access to sensitive files beyond the application scope. This threatens confidentiality of project data and underlying system files, integrity of the project management environment, and availability if attackers disrupt services or deploy ransomware. Given OpenProject's use in collaborative and project-critical environments, exploitation could disrupt workflows, leak intellectual property, and damage organizational reputation. The vulnerability's network accessibility and lack of user interaction requirement increase the likelihood of exploitation in European enterprises relying on OpenProject for project management.

Mitigation Recommendations

1. Immediately upgrade OpenProject installations to version 16.6.7 or 17.0.3 or later to apply the official patch. 2. Restrict 'browse_repository' permissions to trusted users only, minimizing the attack surface. 3. Implement strict input validation and sanitization on all user-supplied parameters, especially those passed to system commands. 4. Employ application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block command injection attempts. 5. Monitor logs for unusual git log command executions or unexpected file writes in repository directories. 6. Use containerization or sandboxing to limit the impact of potential RCE exploits. 7. Conduct regular security audits and penetration tests focusing on repository endpoints. 8. Educate developers and administrators about secure coding practices related to command execution and parameter handling.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-05T18:35:52.358Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698667edf9fa50a62f37ce33

Added to database: 2/6/2026, 10:15:09 PM

Last enriched: 2/14/2026, 12:13:25 PM

Last updated: 3/24/2026, 12:10:27 AM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses