Skip to content

Commit 1dfe773

Browse files
committed
Update security fixes
1 parent f4bec13 commit 1dfe773

1 file changed

Lines changed: 91 additions & 0 deletions

File tree

docs/release-notes/17-2-0/README.md

Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,97 @@ release_date: 2026-03-11
1616

1717
<!-- BEGIN CVE AUTOMATED SECTION -->
1818

19+
## Security fixes
20+
21+
22+
23+
### CVE-2026-30234 - OpenProject BIM BCF XML Import: <Snapshot> Path Traversal Leads to Arbitrary Local File Read (AFR)
24+
25+
An authenticated project member with BCF import permissions can upload a crafted `.bcf` archive where the `<Snapshot>` value in `markup.bcf` is manipulated to contain an absolute or traversal local path (for example: `/etc/passwd` or `../../../../etc/passwd`).
26+
27+
28+
29+
During import, this untrusted `<Snapshot>` value is used as `file.path` during attachment processing.
30+
31+
As a result, local filesystem content can be read outside the intended ZIP scope.
32+
33+
34+
35+
This results in an **Arbitrary File Read (AFR)** within the read permissions of the OpenProject application user.
36+
37+
38+
39+
This vulnerability was reported independently by users sam91281 and DQH1 as part of the [YesWeHack.com OpenProject Bug Bounty program](https://yeswehack.com/programs/openproject), sponsored by the European Commission.
40+
41+
42+
43+
For more information, please see the [GitHub advisory #GHSA-q8c5-vpmm-xrxv](https://github.com/opf/openproject/security/advisories/GHSA-q8c5-vpmm-xrxv)
44+
45+
46+
47+
### CVE-2026-30235 - Business Logic Error on OpenProject through hyperlinks in markdown using DOM clobbering
48+
49+
This vulnerability occurs due to improper validation of OpenProject’s Markdown rendering, specifically in the hyperlink handling. This allows an attacker to inject malicious hyperlink payloads that perform DOM clobbering. DOM clobbering can crash or blank the entire page by overwriting native DOM functions with HTML elements, causing critical JavaScript calls to throw runtime errors during application initialization and halt further execution.
50+
51+
52+
53+
This vulnerability was reported by user frozzipies as part of the [YesWeHack.com OpenProject Bug Bounty program](https://yeswehack.com/programs/openproject), sponsored by the European Commission.
54+
55+
56+
57+
For more information, please see the [GitHub advisory #GHSA-9rv2-9xv5-gpq8](https://github.com/opf/openproject/security/advisories/GHSA-9rv2-9xv5-gpq8)
58+
59+
60+
61+
### CVE-2026-30236 - Users that are not project members can be used to calculate Labor Budget, leaking their global hourly rate
62+
63+
When editing a project budget and planning the labor cost, it was not checked that the user that was planned in the budget is actually a project member. This exposed the user&#39;s default rate (if one was set up) to users that should only see that information for project members.
64+
65+
66+
67+
Also, the endpoint that handles the pre-calculation for the frontend to display a preview of the costs, while it was being entered, did not properly validate the membership of the user as well. This also allowed to calculate costs with the default rate of non-members.
68+
69+
70+
71+
This vulnerability was reported by user Thesecret2055 as part of the [YesWeHack.com OpenProject Bug Bounty program](https://yeswehack.com/programs/openproject), sponsored by the European Commission.
72+
73+
74+
75+
For more information, please see the [GitHub advisory #GHSA-p747-569x-3v3f](https://github.com/opf/openproject/security/advisories/GHSA-p747-569x-3v3f)
76+
77+
78+
79+
### CVE-2026-30239 - Permission Check bypass on Budget deletion allows reassignment of WorkPackages into other budgets
80+
81+
When budgets are deleted, the work packages that were assigned to this budget need to be moved to a different budget. This action was performed before the permission check on the delete action was executed. This allowed all users in the application to delete work package budget assignments.
82+
83+
84+
85+
This vulnerability was reported by user cavid as part of the [YesWeHack.com OpenProject Bug Bounty program](https://yeswehack.com/programs/openproject), sponsored by the European Commission.
86+
87+
88+
89+
For more information, please see the [GitHub advisory #GHSA-gpvh-g967-g4h8](https://github.com/opf/openproject/security/advisories/GHSA-gpvh-g967-g4h8)
90+
91+
92+
93+
### CVE-2026-31974 - Blind SSRF on OpenProject instance via webhooks, and through /admin/test_email via POST request leads to internal network reconnaissance
94+
95+
OpenProject SMTP test endpoint (POST /admin/settings/mail\_notifications) accepts arbitrary host and port values and exhibits measurable differences in response behaviour depending on whether the target IP exists and whether the port is open. An attacker with access can use these timing and error distinctions to map internal hosts and identify which services/ports are reachable.
96+
97+
98+
99+
Similarly, you can create webhooks in OpenProject and point them to arbitrary IPs, resulting in the same kind of SSRF issue which allows attackers to scan the internal network.
100+
101+
102+
103+
This vulnerability was reported by user [drak3hft7](https://yeswehack.com/hunters/drak3hft7) and [adilburak](https://yeswehack.com/hunters/drak3hft7) as part of the [YesWeHack.com OpenProject Bug Bounty program](https://yeswehack.com/programs/openproject), sponsored by the European Commission.
104+
105+
106+
107+
For more information, please see the [GitHub advisory #GHSA-9wr7-j98g-2jh3](https://github.com/opf/openproject/security/advisories/GHSA-9wr7-j98g-2jh3)
108+
109+
19110
<!-- END CVE AUTOMATED SECTION -->
20111

21112
## Important feature changes

0 commit comments

Comments
 (0)