Please find our statement on security in this document: https://www.openproject.org/docs/security-and-privacy/statement-on-security/
Security: opf/openproject
Security
SECURITY.md
-
Cross-Project Meeting Agenda Item Injection via Unscoped Section LookupGHSA-hh5p-gwf8-h245 published
Apr 15, 2026 by oliverguentherModerate -
Reminders Leak Work Package Data After Access RevocationGHSA-qr54-686p-j34x published
Apr 15, 2026 by oliverguentherModerate -
SQL Injection in Cost Reporting =n Operator via parse_number_stringGHSA-5rrm-6qmq-2364 published
Mar 31, 2026 by oliverguentherCritical -
Repository files are served with the MIME type allowing them to be used to bypass Content Security PolicyGHSA-p423-72h4-fjvp published
Mar 16, 2026 by oliverguentherCritical -
SQL Injection via Custom Field Name can be chained to Remote Code ExecutionGHSA-jqhf-rf9x-9rhx published
Mar 16, 2026 by oliverguentherCritical -
2FA OTP Verification Missing Rate Limiting (CWE-307)GHSA-234r-45m2-w6cv published
Apr 15, 2026 by oliverguentherHigh -
Blind SSRF on OpenProject instance via webhooks, and through /admin/test_email via POST request leads to internal network reconnaissanceGHSA-9wr7-j98g-2jh3 published
Mar 11, 2026 by machisujiLow -
Permission Check bypass on Budget deletion allows reassignment of WorkPackages into other budgetsGHSA-gpvh-g967-g4h8 published
Mar 11, 2026 by machisujiModerate -
Users that are not project members can be used to calculate Labor Budget, leaking their global hourly rateGHSA-p747-569x-3v3f published
Mar 11, 2026 by machisujiModerate -
OpenProject BIM BCF XML Import: <Snapshot> Path Traversal Leads to Arbitrary Local File Read (AFR)GHSA-q8c5-vpmm-xrxv published
Mar 11, 2026 by machisujiModerate
Learn more about advisories related to opf/openproject in the GitHub Advisory Database