CVE-2026-25763: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in opf openproject
CVE-2026-25763 is a critical OS command injection vulnerability in OpenProject versions prior to 16. 6. 7 and 17. 0. 3. It allows users with browse_repository permission to inject arbitrary git log command-line options via the rev parameter, leading to arbitrary file writes. Crafted commits can enable attackers to upload shell scripts, resulting in remote code execution (RCE). Exploitation requires no user interaction beyond permission to browse the repository. The vulnerability can lead to reverse shells and unauthorized access to sensitive files outside OpenProject. This flaw has been patched in the specified versions.
AI Analysis
Technical Summary
CVE-2026-25763 is an OS command injection vulnerability classified under CWE-78 affecting OpenProject, an open-source web-based project management software. The flaw exists in the repository changes endpoint (/projects/:project_id/repository/changes) when rendering the “latest changes” view using git log. Specifically, the rev parameter is improperly sanitized, allowing an attacker to inject arbitrary git log command-line options such as --output=/tmp/poc.txt. When OpenProject executes the SCM git log command, Git interprets the injected options, enabling the attacker to write output to arbitrary file paths writable by the OpenProject process user. Although the output is git log data, attackers can craft commits to embed shell scripts, effectively enabling remote code execution (RCE). This RCE can be leveraged to establish reverse shells, escalate privileges, and access sensitive files like /etc/passwd outside the application context. Exploitation requires only the browse_repository permission, which is commonly granted in project collaboration settings. The vulnerability affects OpenProject versions before 16.6.7 and 17.0.3, and has been patched in these releases. The CVSS 4.0 score of 9.4 reflects the vulnerability’s critical nature, with network attack vector, low attack complexity, no user interaction, and privileges required but with high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the potential for severe damage is significant.
Potential Impact
For European organizations, this vulnerability poses a severe risk to the confidentiality, integrity, and availability of project management environments. OpenProject is widely used in software development, engineering, and collaborative project management across Europe, including in government, education, and private sectors. Successful exploitation could allow attackers to execute arbitrary code on servers, leading to data breaches, unauthorized access to sensitive internal files, and potential lateral movement within networks. The ability to write arbitrary files and execute shell scripts increases the risk of persistent backdoors and ransomware deployment. Organizations relying on OpenProject for critical project workflows could face operational disruptions and reputational damage. The vulnerability’s exploitation could also impact compliance with GDPR and other data protection regulations due to unauthorized data exposure. Given the ease of exploitation and the commonality of the browse_repository permission, the threat is particularly acute for organizations with collaborative development environments and insufficient access controls.
Mitigation Recommendations
Organizations should immediately upgrade OpenProject installations to versions 16.6.7 or 17.0.3 or later, where the vulnerability is patched. Until upgrades are applied, restrict the browse_repository permission to trusted users only, minimizing the attack surface. Implement strict input validation and sanitization on parameters that interact with system commands, particularly rev or similar inputs. Employ application-layer firewalls or Web Application Firewalls (WAFs) to detect and block suspicious command injection patterns targeting the repository changes endpoint. Monitor logs for unusual git log command executions or unexpected file writes, especially to temporary directories. Conduct regular audits of user permissions and repository access controls to ensure least privilege principles. Isolate OpenProject servers within segmented network zones to limit potential lateral movement. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2026-25763: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in opf openproject
Description
CVE-2026-25763 is a critical OS command injection vulnerability in OpenProject versions prior to 16. 6. 7 and 17. 0. 3. It allows users with browse_repository permission to inject arbitrary git log command-line options via the rev parameter, leading to arbitrary file writes. Crafted commits can enable attackers to upload shell scripts, resulting in remote code execution (RCE). Exploitation requires no user interaction beyond permission to browse the repository. The vulnerability can lead to reverse shells and unauthorized access to sensitive files outside OpenProject. This flaw has been patched in the specified versions.
AI-Powered Analysis
Technical Analysis
CVE-2026-25763 is an OS command injection vulnerability classified under CWE-78 affecting OpenProject, an open-source web-based project management software. The flaw exists in the repository changes endpoint (/projects/:project_id/repository/changes) when rendering the “latest changes” view using git log. Specifically, the rev parameter is improperly sanitized, allowing an attacker to inject arbitrary git log command-line options such as --output=/tmp/poc.txt. When OpenProject executes the SCM git log command, Git interprets the injected options, enabling the attacker to write output to arbitrary file paths writable by the OpenProject process user. Although the output is git log data, attackers can craft commits to embed shell scripts, effectively enabling remote code execution (RCE). This RCE can be leveraged to establish reverse shells, escalate privileges, and access sensitive files like /etc/passwd outside the application context. Exploitation requires only the browse_repository permission, which is commonly granted in project collaboration settings. The vulnerability affects OpenProject versions before 16.6.7 and 17.0.3, and has been patched in these releases. The CVSS 4.0 score of 9.4 reflects the vulnerability’s critical nature, with network attack vector, low attack complexity, no user interaction, and privileges required but with high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the potential for severe damage is significant.
Potential Impact
For European organizations, this vulnerability poses a severe risk to the confidentiality, integrity, and availability of project management environments. OpenProject is widely used in software development, engineering, and collaborative project management across Europe, including in government, education, and private sectors. Successful exploitation could allow attackers to execute arbitrary code on servers, leading to data breaches, unauthorized access to sensitive internal files, and potential lateral movement within networks. The ability to write arbitrary files and execute shell scripts increases the risk of persistent backdoors and ransomware deployment. Organizations relying on OpenProject for critical project workflows could face operational disruptions and reputational damage. The vulnerability’s exploitation could also impact compliance with GDPR and other data protection regulations due to unauthorized data exposure. Given the ease of exploitation and the commonality of the browse_repository permission, the threat is particularly acute for organizations with collaborative development environments and insufficient access controls.
Mitigation Recommendations
Organizations should immediately upgrade OpenProject installations to versions 16.6.7 or 17.0.3 or later, where the vulnerability is patched. Until upgrades are applied, restrict the browse_repository permission to trusted users only, minimizing the attack surface. Implement strict input validation and sanitization on parameters that interact with system commands, particularly rev or similar inputs. Employ application-layer firewalls or Web Application Firewalls (WAFs) to detect and block suspicious command injection patterns targeting the repository changes endpoint. Monitor logs for unusual git log command executions or unexpected file writes, especially to temporary directories. Conduct regular audits of user permissions and repository access controls to ensure least privilege principles. Isolate OpenProject servers within segmented network zones to limit potential lateral movement. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-05T18:35:52.358Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698667edf9fa50a62f37ce33
Added to database: 2/6/2026, 10:15:09 PM
Last enriched: 2/6/2026, 10:29:28 PM
Last updated: 2/7/2026, 12:24:07 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.