CVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
OpenProject is an open-source, web-based project management software. Prior to versions 16.6.7 and 17.0.3, an HTML injection vulnerability occurs in the time tracking function of OpenProject. The application does not escape HTML tags, an attacker with administrator privileges can create a work package with the name containing the HTML tags and add it to the Work package section when creating time tracking. This issue has been patched in versions 16.6.7 and 17.0.3.
AI Analysis
Technical Summary
CVE-2026-25764 is an improper neutralization of script-related HTML tags vulnerability (CWE-80) identified in OpenProject, a widely used open-source web-based project management software. The vulnerability resides in the time tracking feature where HTML tags in work package names are not escaped before rendering. This allows an attacker with administrator privileges to inject arbitrary HTML or script code by crafting a work package name containing malicious tags. When such a work package is added to the time tracking section, the injected code executes in the context of users viewing the page, constituting a basic reflected or stored XSS attack. The vulnerability affects OpenProject versions prior to 16.6.7 and 17.0.3, and has been addressed in these releases. The CVSS 3.1 base score is 3.5 (low), reflecting the requirement for high privileges (administrator), user interaction, and the limited impact primarily on integrity and availability. Confidentiality is not impacted. No public exploits have been reported, indicating limited active exploitation. The vulnerability could be leveraged to perform actions such as session manipulation, UI redressing, or denial of service within the scope of the affected application, but the prerequisite of admin privileges significantly reduces the attack surface.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but not negligible. Since exploitation requires administrator privileges, the threat is mainly from insider attackers or compromised admin accounts. Successful exploitation could lead to injection of malicious scripts that might alter the integrity of project data or disrupt availability by causing UI or application malfunctions. However, there is no direct confidentiality breach. Organizations relying on OpenProject for critical project management and time tracking could face operational disruptions or trust issues if attackers manipulate displayed data or inject misleading content. The risk is higher in environments with weak internal access controls or where administrator credentials are insufficiently protected. Given the open-source nature of OpenProject, many European public sector and private organizations use it, so patching is essential to maintain operational integrity.
Mitigation Recommendations
European organizations should immediately upgrade OpenProject installations to versions 16.6.7 or 17.0.3 or later to apply the official patch. Beyond patching, organizations should enforce strict administrator access controls, including multi-factor authentication and regular credential audits, to reduce the risk of privilege misuse. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources. Regularly review and sanitize user-generated content even if it originates from trusted roles to prevent injection of malicious code. Conduct security awareness training for administrators to recognize and avoid risky behaviors. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting OpenProject. Finally, monitor logs for unusual administrator activities or unexpected changes in work package names that could indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
Description
OpenProject is an open-source, web-based project management software. Prior to versions 16.6.7 and 17.0.3, an HTML injection vulnerability occurs in the time tracking function of OpenProject. The application does not escape HTML tags, an attacker with administrator privileges can create a work package with the name containing the HTML tags and add it to the Work package section when creating time tracking. This issue has been patched in versions 16.6.7 and 17.0.3.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25764 is an improper neutralization of script-related HTML tags vulnerability (CWE-80) identified in OpenProject, a widely used open-source web-based project management software. The vulnerability resides in the time tracking feature where HTML tags in work package names are not escaped before rendering. This allows an attacker with administrator privileges to inject arbitrary HTML or script code by crafting a work package name containing malicious tags. When such a work package is added to the time tracking section, the injected code executes in the context of users viewing the page, constituting a basic reflected or stored XSS attack. The vulnerability affects OpenProject versions prior to 16.6.7 and 17.0.3, and has been addressed in these releases. The CVSS 3.1 base score is 3.5 (low), reflecting the requirement for high privileges (administrator), user interaction, and the limited impact primarily on integrity and availability. Confidentiality is not impacted. No public exploits have been reported, indicating limited active exploitation. The vulnerability could be leveraged to perform actions such as session manipulation, UI redressing, or denial of service within the scope of the affected application, but the prerequisite of admin privileges significantly reduces the attack surface.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but not negligible. Since exploitation requires administrator privileges, the threat is mainly from insider attackers or compromised admin accounts. Successful exploitation could lead to injection of malicious scripts that might alter the integrity of project data or disrupt availability by causing UI or application malfunctions. However, there is no direct confidentiality breach. Organizations relying on OpenProject for critical project management and time tracking could face operational disruptions or trust issues if attackers manipulate displayed data or inject misleading content. The risk is higher in environments with weak internal access controls or where administrator credentials are insufficiently protected. Given the open-source nature of OpenProject, many European public sector and private organizations use it, so patching is essential to maintain operational integrity.
Mitigation Recommendations
European organizations should immediately upgrade OpenProject installations to versions 16.6.7 or 17.0.3 or later to apply the official patch. Beyond patching, organizations should enforce strict administrator access controls, including multi-factor authentication and regular credential audits, to reduce the risk of privilege misuse. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources. Regularly review and sanitize user-generated content even if it originates from trusted roles to prevent injection of malicious code. Conduct security awareness training for administrators to recognize and avoid risky behaviors. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting OpenProject. Finally, monitor logs for unusual administrator activities or unexpected changes in work package names that could indicate exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-05T18:35:52.358Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698667edf9fa50a62f37ce38
Added to database: 2/6/2026, 10:15:09 PM
Last enriched: 2/14/2026, 12:13:36 PM
Last updated: 3/22/2026, 4:11:12 PM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.