Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25763: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in opf openproject

0
Critical
VulnerabilityCVE-2026-25763cvecve-2026-25763cwe-78
Published: Fri Feb 06 2026 (02/06/2026, 22:10:13 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

CVE-2026-25763 is a critical OS command injection vulnerability in OpenProject versions prior to 16. 6. 7 and 17. 0. 3. It allows users with browse_repository permission to inject arbitrary git log command-line options via the rev parameter, leading to arbitrary file writes. Crafted commits can enable attackers to upload shell scripts, resulting in remote code execution (RCE). Exploitation requires no user interaction beyond permission to browse the repository. The vulnerability can lead to reverse shells and unauthorized access to sensitive files outside OpenProject. This flaw has been patched in the specified versions.

AI-Powered Analysis

AILast updated: 02/06/2026, 22:29:28 UTC

Technical Analysis

CVE-2026-25763 is an OS command injection vulnerability classified under CWE-78 affecting OpenProject, an open-source web-based project management software. The flaw exists in the repository changes endpoint (/projects/:project_id/repository/changes) when rendering the “latest changes” view using git log. Specifically, the rev parameter is improperly sanitized, allowing an attacker to inject arbitrary git log command-line options such as --output=/tmp/poc.txt. When OpenProject executes the SCM git log command, Git interprets the injected options, enabling the attacker to write output to arbitrary file paths writable by the OpenProject process user. Although the output is git log data, attackers can craft commits to embed shell scripts, effectively enabling remote code execution (RCE). This RCE can be leveraged to establish reverse shells, escalate privileges, and access sensitive files like /etc/passwd outside the application context. Exploitation requires only the browse_repository permission, which is commonly granted in project collaboration settings. The vulnerability affects OpenProject versions before 16.6.7 and 17.0.3, and has been patched in these releases. The CVSS 4.0 score of 9.4 reflects the vulnerability’s critical nature, with network attack vector, low attack complexity, no user interaction, and privileges required but with high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the potential for severe damage is significant.

Potential Impact

For European organizations, this vulnerability poses a severe risk to the confidentiality, integrity, and availability of project management environments. OpenProject is widely used in software development, engineering, and collaborative project management across Europe, including in government, education, and private sectors. Successful exploitation could allow attackers to execute arbitrary code on servers, leading to data breaches, unauthorized access to sensitive internal files, and potential lateral movement within networks. The ability to write arbitrary files and execute shell scripts increases the risk of persistent backdoors and ransomware deployment. Organizations relying on OpenProject for critical project workflows could face operational disruptions and reputational damage. The vulnerability’s exploitation could also impact compliance with GDPR and other data protection regulations due to unauthorized data exposure. Given the ease of exploitation and the commonality of the browse_repository permission, the threat is particularly acute for organizations with collaborative development environments and insufficient access controls.

Mitigation Recommendations

Organizations should immediately upgrade OpenProject installations to versions 16.6.7 or 17.0.3 or later, where the vulnerability is patched. Until upgrades are applied, restrict the browse_repository permission to trusted users only, minimizing the attack surface. Implement strict input validation and sanitization on parameters that interact with system commands, particularly rev or similar inputs. Employ application-layer firewalls or Web Application Firewalls (WAFs) to detect and block suspicious command injection patterns targeting the repository changes endpoint. Monitor logs for unusual git log command executions or unexpected file writes, especially to temporary directories. Conduct regular audits of user permissions and repository access controls to ensure least privilege principles. Isolate OpenProject servers within segmented network zones to limit potential lateral movement. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-05T18:35:52.358Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698667edf9fa50a62f37ce33

Added to database: 2/6/2026, 10:15:09 PM

Last enriched: 2/6/2026, 10:29:28 PM

Last updated: 2/7/2026, 12:24:07 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats