Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject

0
Low
VulnerabilityCVE-2026-25764cvecve-2026-25764cwe-80
Published: Fri Feb 06 2026 (02/06/2026, 22:10:09 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

OpenProject is an open-source, web-based project management software. Prior to versions 16.6.7 and 17.0.3, an HTML injection vulnerability occurs in the time tracking function of OpenProject. The application does not escape HTML tags, an attacker with administrator privileges can create a work package with the name containing the HTML tags and add it to the Work package section when creating time tracking. This issue has been patched in versions 16.6.7 and 17.0.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 12:13:36 UTC

Technical Analysis

CVE-2026-25764 is an improper neutralization of script-related HTML tags vulnerability (CWE-80) identified in OpenProject, a widely used open-source web-based project management software. The vulnerability resides in the time tracking feature where HTML tags in work package names are not escaped before rendering. This allows an attacker with administrator privileges to inject arbitrary HTML or script code by crafting a work package name containing malicious tags. When such a work package is added to the time tracking section, the injected code executes in the context of users viewing the page, constituting a basic reflected or stored XSS attack. The vulnerability affects OpenProject versions prior to 16.6.7 and 17.0.3, and has been addressed in these releases. The CVSS 3.1 base score is 3.5 (low), reflecting the requirement for high privileges (administrator), user interaction, and the limited impact primarily on integrity and availability. Confidentiality is not impacted. No public exploits have been reported, indicating limited active exploitation. The vulnerability could be leveraged to perform actions such as session manipulation, UI redressing, or denial of service within the scope of the affected application, but the prerequisite of admin privileges significantly reduces the attack surface.

Potential Impact

For European organizations, the impact of this vulnerability is generally low but not negligible. Since exploitation requires administrator privileges, the threat is mainly from insider attackers or compromised admin accounts. Successful exploitation could lead to injection of malicious scripts that might alter the integrity of project data or disrupt availability by causing UI or application malfunctions. However, there is no direct confidentiality breach. Organizations relying on OpenProject for critical project management and time tracking could face operational disruptions or trust issues if attackers manipulate displayed data or inject misleading content. The risk is higher in environments with weak internal access controls or where administrator credentials are insufficiently protected. Given the open-source nature of OpenProject, many European public sector and private organizations use it, so patching is essential to maintain operational integrity.

Mitigation Recommendations

European organizations should immediately upgrade OpenProject installations to versions 16.6.7 or 17.0.3 or later to apply the official patch. Beyond patching, organizations should enforce strict administrator access controls, including multi-factor authentication and regular credential audits, to reduce the risk of privilege misuse. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources. Regularly review and sanitize user-generated content even if it originates from trusted roles to prevent injection of malicious code. Conduct security awareness training for administrators to recognize and avoid risky behaviors. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting OpenProject. Finally, monitor logs for unusual administrator activities or unexpected changes in work package names that could indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-05T18:35:52.358Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698667edf9fa50a62f37ce38

Added to database: 2/6/2026, 10:15:09 PM

Last enriched: 2/14/2026, 12:13:36 PM

Last updated: 3/22/2026, 4:11:12 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses