CVE-2026-30235: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in opf openproject
OpenProject is an open-source, web-based project management software. Prior to 17.2.0, this vulnerability occurs due to improper validation of OpenProject’s Markdown rendering, specifically in the hyperlink handling. This allows an attacker to inject malicious hyperlink payloads that perform DOM clobbering. DOM clobbering can crash or blank the entire page by overwriting native DOM functions with HTML elements, causing critical JavaScript calls to throw runtime errors during application initialization and halt further execution. This vulnerability is fixed in 17.2.0.
AI Analysis
Technical Summary
CVE-2026-30235 is a cross-site scripting vulnerability categorized under CWE-79 affecting OpenProject, an open-source web-based project management tool. The flaw exists in versions prior to 17.2.0 due to improper input validation during Markdown rendering, specifically in hyperlink handling. Attackers can craft malicious hyperlink payloads that exploit DOM clobbering, a technique where injected HTML elements overwrite native DOM functions. This manipulation causes critical JavaScript calls to throw runtime errors during the application's initialization phase, effectively crashing or blanking the entire page and halting further script execution. Unlike typical XSS attacks that may steal data or hijack sessions, this vulnerability primarily results in denial of service by disrupting the application's availability. The CVSS 3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting availability only. There are no known exploits in the wild as of the published date. The vulnerability is resolved in OpenProject version 17.2.0 by correcting the Markdown hyperlink validation logic to prevent DOM clobbering.
Potential Impact
The primary impact of this vulnerability is denial of service, as successful exploitation crashes or blanks the OpenProject web interface, preventing users from accessing project management functionalities. This disruption can affect team productivity, project tracking, and collaboration, especially in organizations relying heavily on OpenProject for daily operations. Since the vulnerability does not compromise confidentiality or integrity, sensitive data exposure or unauthorized modifications are not direct concerns. However, the loss of availability can have cascading effects, such as delayed project timelines and impaired communication. Attackers with network access and low privileges within the OpenProject environment can exploit this flaw without requiring user interaction, increasing the risk in multi-user or shared environments. Organizations using vulnerable versions may face operational interruptions until patched.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade OpenProject to version 17.2.0 or later, where the issue is fixed. Until upgrading is possible, administrators can implement strict input validation and sanitization on Markdown content, particularly scrutinizing hyperlink inputs to prevent injection of malicious payloads. Employing Content Security Policy (CSP) headers can help reduce the impact of injected scripts by restricting script execution sources. Monitoring application logs for unusual JavaScript errors or page crashes can aid in early detection of exploitation attempts. Limiting user privileges to the minimum necessary reduces the attack surface, as exploitation requires at least low privileges. Regularly reviewing and updating third-party dependencies and plugins associated with OpenProject can also prevent similar vulnerabilities. Finally, educating users about the risks of injecting untrusted Markdown content can reduce inadvertent exposure.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Sweden, Switzerland, Japan
CVE-2026-30235: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in opf openproject
Description
OpenProject is an open-source, web-based project management software. Prior to 17.2.0, this vulnerability occurs due to improper validation of OpenProject’s Markdown rendering, specifically in the hyperlink handling. This allows an attacker to inject malicious hyperlink payloads that perform DOM clobbering. DOM clobbering can crash or blank the entire page by overwriting native DOM functions with HTML elements, causing critical JavaScript calls to throw runtime errors during application initialization and halt further execution. This vulnerability is fixed in 17.2.0.
AI-Powered Analysis
Technical Analysis
CVE-2026-30235 is a cross-site scripting vulnerability categorized under CWE-79 affecting OpenProject, an open-source web-based project management tool. The flaw exists in versions prior to 17.2.0 due to improper input validation during Markdown rendering, specifically in hyperlink handling. Attackers can craft malicious hyperlink payloads that exploit DOM clobbering, a technique where injected HTML elements overwrite native DOM functions. This manipulation causes critical JavaScript calls to throw runtime errors during the application's initialization phase, effectively crashing or blanking the entire page and halting further script execution. Unlike typical XSS attacks that may steal data or hijack sessions, this vulnerability primarily results in denial of service by disrupting the application's availability. The CVSS 3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting availability only. There are no known exploits in the wild as of the published date. The vulnerability is resolved in OpenProject version 17.2.0 by correcting the Markdown hyperlink validation logic to prevent DOM clobbering.
Potential Impact
The primary impact of this vulnerability is denial of service, as successful exploitation crashes or blanks the OpenProject web interface, preventing users from accessing project management functionalities. This disruption can affect team productivity, project tracking, and collaboration, especially in organizations relying heavily on OpenProject for daily operations. Since the vulnerability does not compromise confidentiality or integrity, sensitive data exposure or unauthorized modifications are not direct concerns. However, the loss of availability can have cascading effects, such as delayed project timelines and impaired communication. Attackers with network access and low privileges within the OpenProject environment can exploit this flaw without requiring user interaction, increasing the risk in multi-user or shared environments. Organizations using vulnerable versions may face operational interruptions until patched.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade OpenProject to version 17.2.0 or later, where the issue is fixed. Until upgrading is possible, administrators can implement strict input validation and sanitization on Markdown content, particularly scrutinizing hyperlink inputs to prevent injection of malicious payloads. Employing Content Security Policy (CSP) headers can help reduce the impact of injected scripts by restricting script execution sources. Monitoring application logs for unusual JavaScript errors or page crashes can aid in early detection of exploitation attempts. Limiting user privileges to the minimum necessary reduces the attack surface, as exploitation requires at least low privileges. Regularly reviewing and updating third-party dependencies and plugins associated with OpenProject can also prevent similar vulnerabilities. Finally, educating users about the risks of injecting untrusted Markdown content can reduce inadvertent exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-04T17:23:59.798Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b198902f860ef9433d35f2
Added to database: 3/11/2026, 4:30:08 PM
Last enriched: 3/11/2026, 4:45:15 PM
Last updated: 3/11/2026, 8:18:46 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.