Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-32698

OpenProject has a SQL Injection via Custom Field Name that can be chained to Remote Code Execution
Back to all
CVE

CVE-2026-32698

OpenProject has a SQL Injection via Custom Field Name that can be chained to Remote Code Execution

OpenProject is an open-source, web-based project management software. Versions prior to 16.6.9, 17.0.6, 17.1.3, and 17.2.1 are vulnerable to an SQL injection attack via a custom field's name. When that custom field was used in a Cost Report, the custom field's name was injected into the SQL query without proper sanitation. This allowed an attacker to execute arbitrary SQL commands during the generation of a Cost Report. As custom fields can only be generated by users with full administrator privileges, the attack surface is somewhat reduced. Together with another bug in the Repositories_module, that used the project identifier without sanitation to generate the checkout path for a git repository in the filesystem, this allowed an attacker to checkout a git repository to an arbitrarily chosen path on the server. If the checkout is done within certain paths within the OpenProject application, upon the next restart of the application, this allows the attacker to inject ruby code into the application. As the project identifier cannot be manually edited to any string containing special characters like dots or slashes, this needs to be changed via the SQL injection described above. Versions 16.6.9, 17.0.6, 17.1.3, and 17.2.1 fix the issue.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
9.1
-
3.1
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
C
H
U
-

Related Resources

No items found.

References

https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/32xxx/CVE-2026-32698.json, https://github.com/opf/openproject/security/advisories/GHSA-jqhf-rf9x-9rhx, https://nvd.nist.gov/vuln/detail/CVE-2026-32698

Severity

9.1

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
9.1
EPSS Probability
0.00035%
EPSS Percentile
0.10101%
Introduced Version
0,acbb059c8820da8236cee1f43dc0796d83836259,bdd71242fc9c7ccb6a7d5bc70fad236dbda69b3e,6e12af7f2d682fff2418d67ff91fbab00c6a3169
Fix Available
494c7a7229d2e0498a2ea6e6b4862f054741b37b,3e1b0a8218ce497f579bd207be91be682242fb61,a5cb0dc635eef97a36fa862502960749d8ebc8dc,28801970691bd8f99592e76fdb99e04e441b7ee6

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading