CVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
CVE-2026-25764 is a low-severity cross-site scripting (XSS) vulnerability in OpenProject, an open-source project management tool. The flaw exists in versions prior to 16. 6. 7 and 17. 0. 3 within the time tracking feature, where HTML tags in work package names are not properly escaped. An attacker with administrator privileges can inject malicious HTML or script code by creating a work package with crafted names, which then executes when viewed in the time tracking section. This vulnerability requires high privileges and user interaction to exploit, limiting its impact. The issue has been patched in the specified versions. European organizations using affected OpenProject versions should update promptly to mitigate risk.
AI Analysis
Technical Summary
CVE-2026-25764 is an HTML injection vulnerability classified under CWE-80, affecting OpenProject versions before 16.6.7 and 17.0.3. The vulnerability arises because the time tracking function fails to properly neutralize or escape HTML tags in the work package name field. An attacker with administrator privileges can exploit this by creating a work package with embedded HTML or script tags. When this malicious work package is added to the Work package section during time tracking, the injected code executes in the context of the victim's browser. This type of vulnerability is a form of stored cross-site scripting (XSS), which can lead to script execution, session hijacking, or UI manipulation. However, exploitation requires the attacker to have administrator-level access and the victim to interact with the malicious content, limiting the attack surface. The vulnerability does not directly compromise confidentiality but can impact integrity and availability by executing unauthorized scripts. The issue has been addressed in OpenProject versions 16.6.7 and 17.0.3 by properly escaping HTML tags in the affected fields. No public exploits or active attacks have been reported to date, indicating a low likelihood of widespread exploitation currently.
Potential Impact
For European organizations, the impact of CVE-2026-25764 is relatively low but non-negligible. Since exploitation requires administrator privileges, the threat mainly concerns insider attackers or compromised admin accounts. Successful exploitation could allow attackers to execute arbitrary scripts within the application context, potentially leading to session hijacking, unauthorized actions, or denial of service through UI manipulation. This could disrupt project management workflows and reduce trust in the system's integrity. Organizations relying heavily on OpenProject for critical project tracking and collaboration may experience operational impacts if the vulnerability is exploited. However, the lack of direct confidentiality impact and the requirement for high privileges limit the overall risk. Prompt patching will prevent attackers from leveraging this vulnerability, preserving system availability and integrity. Additionally, organizations should monitor for suspicious administrator activity to detect potential misuse.
Mitigation Recommendations
1. Upgrade OpenProject installations to version 16.6.7 or 17.0.3 or later, where the vulnerability is patched. 2. Restrict administrator privileges strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 3. Implement Content Security Policy (CSP) headers to limit the impact of any injected scripts by restricting script sources and execution contexts. 4. Conduct regular audits of work package names and other user-generated content fields to detect any suspicious or malformed HTML tags. 5. Educate administrators about the risks of injecting untrusted content and encourage safe content creation practices. 6. Monitor application logs and user activity for unusual patterns that may indicate attempts to exploit this vulnerability. 7. Consider deploying web application firewalls (WAF) with rules to detect and block HTML injection or XSS payloads targeting OpenProject endpoints. These steps go beyond generic advice by focusing on privilege management, content monitoring, and layered defenses specific to this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden
CVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
Description
CVE-2026-25764 is a low-severity cross-site scripting (XSS) vulnerability in OpenProject, an open-source project management tool. The flaw exists in versions prior to 16. 6. 7 and 17. 0. 3 within the time tracking feature, where HTML tags in work package names are not properly escaped. An attacker with administrator privileges can inject malicious HTML or script code by creating a work package with crafted names, which then executes when viewed in the time tracking section. This vulnerability requires high privileges and user interaction to exploit, limiting its impact. The issue has been patched in the specified versions. European organizations using affected OpenProject versions should update promptly to mitigate risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-25764 is an HTML injection vulnerability classified under CWE-80, affecting OpenProject versions before 16.6.7 and 17.0.3. The vulnerability arises because the time tracking function fails to properly neutralize or escape HTML tags in the work package name field. An attacker with administrator privileges can exploit this by creating a work package with embedded HTML or script tags. When this malicious work package is added to the Work package section during time tracking, the injected code executes in the context of the victim's browser. This type of vulnerability is a form of stored cross-site scripting (XSS), which can lead to script execution, session hijacking, or UI manipulation. However, exploitation requires the attacker to have administrator-level access and the victim to interact with the malicious content, limiting the attack surface. The vulnerability does not directly compromise confidentiality but can impact integrity and availability by executing unauthorized scripts. The issue has been addressed in OpenProject versions 16.6.7 and 17.0.3 by properly escaping HTML tags in the affected fields. No public exploits or active attacks have been reported to date, indicating a low likelihood of widespread exploitation currently.
Potential Impact
For European organizations, the impact of CVE-2026-25764 is relatively low but non-negligible. Since exploitation requires administrator privileges, the threat mainly concerns insider attackers or compromised admin accounts. Successful exploitation could allow attackers to execute arbitrary scripts within the application context, potentially leading to session hijacking, unauthorized actions, or denial of service through UI manipulation. This could disrupt project management workflows and reduce trust in the system's integrity. Organizations relying heavily on OpenProject for critical project tracking and collaboration may experience operational impacts if the vulnerability is exploited. However, the lack of direct confidentiality impact and the requirement for high privileges limit the overall risk. Prompt patching will prevent attackers from leveraging this vulnerability, preserving system availability and integrity. Additionally, organizations should monitor for suspicious administrator activity to detect potential misuse.
Mitigation Recommendations
1. Upgrade OpenProject installations to version 16.6.7 or 17.0.3 or later, where the vulnerability is patched. 2. Restrict administrator privileges strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 3. Implement Content Security Policy (CSP) headers to limit the impact of any injected scripts by restricting script sources and execution contexts. 4. Conduct regular audits of work package names and other user-generated content fields to detect any suspicious or malformed HTML tags. 5. Educate administrators about the risks of injecting untrusted content and encourage safe content creation practices. 6. Monitor application logs and user activity for unusual patterns that may indicate attempts to exploit this vulnerability. 7. Consider deploying web application firewalls (WAF) with rules to detect and block HTML injection or XSS payloads targeting OpenProject endpoints. These steps go beyond generic advice by focusing on privilege management, content monitoring, and layered defenses specific to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-05T18:35:52.358Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698667edf9fa50a62f37ce38
Added to database: 2/6/2026, 10:15:09 PM
Last enriched: 2/6/2026, 10:29:59 PM
Last updated: 2/6/2026, 11:58:09 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.