Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32698: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in opf openproject

0
Critical
VulnerabilityCVE-2026-32698cvecve-2026-32698cwe-89
Published: Wed Mar 18 2026 (03/18/2026, 21:01:53 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

OpenProject is an open-source, web-based project management software. Versions prior to 16.6.9, 17.0.6, 17.1.3, and 17.2.1 are vulnerable to an SQL injection attack via a custom field's name. When that custom field was used in a Cost Report, the custom field's name was injected into the SQL query without proper sanitation. This allowed an attacker to execute arbitrary SQL commands during the generation of a Cost Report. As custom fields can only be generated by users with full administrator privileges, the attack surface is somewhat reduced. Together with another bug in the Repositories_module, that used the project identifier without sanitation to generate the checkout path for a git repository in the filesystem, this allowed an attacker to checkout a git repository to an arbitrarily chosen path on the server. If the checkout is done within certain paths within the OpenProject application, upon the next restart of the application, this allows the attacker to inject ruby code into the application. As the project identifier cannot be manually edited to any string containing special characters like dots or slashes, this needs to be changed via the SQL injection described above. Versions 16.6.9, 17.0.6, 17.1.3, and 17.2.1 fix the issue.

AI-Powered Analysis

AILast updated: 03/18/2026, 21:42:57 UTC

Technical Analysis

CVE-2026-32698 is a critical SQL injection vulnerability identified in OpenProject, a widely used open-source web-based project management tool. The vulnerability exists in versions prior to 16.6.9, 17.0.6, 17.1.3, and 17.2.1. It stems from improper neutralization of special elements in SQL commands (CWE-89), specifically through a custom field's name that is incorporated into SQL queries for Cost Reports without adequate sanitization. Since custom fields can only be created by users with full administrator privileges, the initial attack vector is limited to high-privilege users. However, once exploited, the attacker can execute arbitrary SQL commands, potentially manipulating the database and application behavior. This SQL injection can be chained with a second vulnerability in the Repositories module, where the project identifier is used unsafely to generate git repository checkout paths on the server filesystem. By exploiting the SQL injection to alter the project identifier, an attacker can cause the application to checkout a git repository to an arbitrary path. If this path is within certain application directories, the attacker can inject malicious Ruby code that executes upon the next application restart, effectively achieving remote code execution. The vulnerability is severe due to its ability to compromise confidentiality, integrity, and availability of the system, and it requires no user interaction but does require administrator privileges. The CVSS v3.1 score is 9.1 (critical), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. The vulnerability has been fixed in versions 16.6.9, 17.0.6, 17.1.3, and 17.2.1. No known exploits have been reported in the wild as of the publication date.

Potential Impact

The impact of CVE-2026-32698 is significant for organizations using vulnerable versions of OpenProject. An attacker with administrator privileges can exploit the SQL injection to execute arbitrary SQL commands, potentially leading to unauthorized data access, data manipulation, or deletion. The chained exploitation with the Repositories module vulnerability allows remote code execution by injecting malicious Ruby code, which can compromise the entire application and underlying server. This can result in full system compromise, data breaches, disruption of project management operations, and potential lateral movement within the network. Given OpenProject's use in managing critical projects and sensitive data, the compromise could affect business continuity, intellectual property confidentiality, and compliance with data protection regulations. The requirement for administrator privileges reduces the attack surface but does not eliminate risk, especially in environments with multiple administrators or where credentials may be compromised. The vulnerability's critical severity and potential for remote code execution make it a high-risk threat that demands immediate attention.

Mitigation Recommendations

To mitigate CVE-2026-32698, organizations should immediately upgrade OpenProject to versions 16.6.9, 17.0.6, 17.1.3, or 17.2.1 or later, where the vulnerability is patched. Restrict administrator privileges strictly and audit existing administrator accounts to ensure only trusted personnel have such access. Implement strong authentication mechanisms, such as multi-factor authentication, to protect administrator accounts from compromise. Regularly review and sanitize all user inputs, especially custom fields and project identifiers, to prevent injection attacks. Monitor application logs for unusual SQL queries or repository checkout activities that may indicate exploitation attempts. Consider isolating the OpenProject server and limiting its network exposure to reduce the risk of remote exploitation. Additionally, conduct regular security assessments and penetration testing focused on injection vulnerabilities and code injection risks. Backup critical data and application configurations to enable recovery in case of compromise. Finally, stay informed about updates and advisories from the OpenProject community and security researchers.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T14:33:42.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bb18f8771bdb1749c6e12f

Added to database: 3/18/2026, 9:28:24 PM

Last enriched: 3/18/2026, 9:42:57 PM

Last updated: 3/19/2026, 6:29:40 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses