Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30235: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in opf openproject

0
Medium
VulnerabilityCVE-2026-30235cvecve-2026-30235cwe-79
Published: Wed Mar 11 2026 (03/11/2026, 16:06:43 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

OpenProject is an open-source, web-based project management software. Prior to 17.2.0, this vulnerability occurs due to improper validation of OpenProject’s Markdown rendering, specifically in the hyperlink handling. This allows an attacker to inject malicious hyperlink payloads that perform DOM clobbering. DOM clobbering can crash or blank the entire page by overwriting native DOM functions with HTML elements, causing critical JavaScript calls to throw runtime errors during application initialization and halt further execution. This vulnerability is fixed in 17.2.0.

AI-Powered Analysis

AILast updated: 03/11/2026, 16:45:15 UTC

Technical Analysis

CVE-2026-30235 is a cross-site scripting vulnerability categorized under CWE-79 affecting OpenProject, an open-source web-based project management tool. The flaw exists in versions prior to 17.2.0 due to improper input validation during Markdown rendering, specifically in hyperlink handling. Attackers can craft malicious hyperlink payloads that exploit DOM clobbering, a technique where injected HTML elements overwrite native DOM functions. This manipulation causes critical JavaScript calls to throw runtime errors during the application's initialization phase, effectively crashing or blanking the entire page and halting further script execution. Unlike typical XSS attacks that may steal data or hijack sessions, this vulnerability primarily results in denial of service by disrupting the application's availability. The CVSS 3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting availability only. There are no known exploits in the wild as of the published date. The vulnerability is resolved in OpenProject version 17.2.0 by correcting the Markdown hyperlink validation logic to prevent DOM clobbering.

Potential Impact

The primary impact of this vulnerability is denial of service, as successful exploitation crashes or blanks the OpenProject web interface, preventing users from accessing project management functionalities. This disruption can affect team productivity, project tracking, and collaboration, especially in organizations relying heavily on OpenProject for daily operations. Since the vulnerability does not compromise confidentiality or integrity, sensitive data exposure or unauthorized modifications are not direct concerns. However, the loss of availability can have cascading effects, such as delayed project timelines and impaired communication. Attackers with network access and low privileges within the OpenProject environment can exploit this flaw without requiring user interaction, increasing the risk in multi-user or shared environments. Organizations using vulnerable versions may face operational interruptions until patched.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade OpenProject to version 17.2.0 or later, where the issue is fixed. Until upgrading is possible, administrators can implement strict input validation and sanitization on Markdown content, particularly scrutinizing hyperlink inputs to prevent injection of malicious payloads. Employing Content Security Policy (CSP) headers can help reduce the impact of injected scripts by restricting script execution sources. Monitoring application logs for unusual JavaScript errors or page crashes can aid in early detection of exploitation attempts. Limiting user privileges to the minimum necessary reduces the attack surface, as exploitation requires at least low privileges. Regularly reviewing and updating third-party dependencies and plugins associated with OpenProject can also prevent similar vulnerabilities. Finally, educating users about the risks of injecting untrusted Markdown content can reduce inadvertent exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T17:23:59.798Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b198902f860ef9433d35f2

Added to database: 3/11/2026, 4:30:08 PM

Last enriched: 3/11/2026, 4:45:15 PM

Last updated: 3/11/2026, 8:18:46 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses