Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34717: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in opf openproject

0
Critical
VulnerabilityCVE-2026-34717cvecve-2026-34717cwe-89
Published: Thu Apr 02 2026 (04/02/2026, 17:59:55 UTC)
Source: CVE Database V5
Vendor/Project: opf
Product: openproject

Description

CVE-2026-34717 is a critical SQL Injection vulnerability in OpenProject versions prior to 17. 2. 3. The flaw arises from improper neutralization of user input in the =n operator within the reporting module, where user data is embedded directly into SQL WHERE clauses without parameterization. This vulnerability allows an attacker with low privileges to execute arbitrary SQL commands remotely without user interaction, potentially leading to data integrity compromise, data leakage, and denial of service. The issue has been patched in OpenProject version 17. 2. 3. Organizations using affected versions should urgently apply the update to mitigate risk. Given the critical CVSS score of 9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 18:23:18 UTC

Technical Analysis

CVE-2026-34717 is a critical SQL Injection vulnerability identified in the open-source project management software OpenProject, specifically affecting versions prior to 17.2.3. The vulnerability is located in the =n operator implementation within the file modules/reporting/lib/report/operator.rb at line 177. This operator improperly embeds user-supplied input directly into SQL WHERE clauses without using parameterized queries or adequate input sanitization, violating CWE-89 standards for neutralizing special elements in SQL commands. As a result, an attacker with low privileges can craft malicious input to manipulate the SQL query logic, enabling unauthorized data access, modification, or deletion. The vulnerability requires no user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS v3.1 base score is 9.9, reflecting its critical severity with network attack vector, low attack complexity, low privileges required, no user interaction, and a scope change that impacts confidentiality, integrity, and availability. The vulnerability was reserved on March 30, 2026, and published on April 2, 2026. Although no known exploits have been reported in the wild, the flaw's nature and severity make it a high-priority patching target. The issue has been addressed in OpenProject version 17.2.3 by implementing proper parameterization and input validation to prevent SQL Injection attacks.

Potential Impact

The impact of CVE-2026-34717 on organizations worldwide is significant due to the critical nature of SQL Injection vulnerabilities. Exploitation can lead to unauthorized disclosure of sensitive project management data, including confidential business information, user credentials, and internal communications. Attackers could also modify or delete data, undermining data integrity and disrupting project workflows. Additionally, the vulnerability could be leveraged to execute denial-of-service attacks by causing database errors or resource exhaustion. Since OpenProject is used globally by enterprises, government agencies, and NGOs for collaborative project management, the compromise of such systems could have cascading effects on operational continuity and trust. The vulnerability’s low attack complexity and lack of user interaction requirements increase the likelihood of exploitation, potentially enabling widespread attacks if left unpatched. Organizations that have not upgraded to version 17.2.3 remain at high risk, especially those with internet-facing OpenProject instances or insufficient network segmentation.

Mitigation Recommendations

To mitigate CVE-2026-34717, organizations should immediately upgrade OpenProject to version 17.2.3 or later, where the vulnerability has been patched through proper parameterization of SQL queries. Until the upgrade can be applied, organizations should restrict access to OpenProject instances by implementing network-level controls such as IP whitelisting and VPN-only access. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL Injection patterns targeting the vulnerable operator. Conduct thorough code reviews and penetration testing on custom OpenProject deployments to identify any residual injection points. Additionally, enable detailed logging and monitoring of database queries and application logs to detect anomalous activities indicative of exploitation attempts. Educate developers and administrators on secure coding practices, emphasizing the importance of parameterized queries and input validation. Finally, maintain regular backups of project data to enable recovery in case of data tampering or loss.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-30T18:41:20.753Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ceb0a7e6bfc5ba1df381ef

Added to database: 4/2/2026, 6:08:39 PM

Last enriched: 4/2/2026, 6:23:18 PM

Last updated: 4/2/2026, 7:23:46 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses