CVE-2026-22601

OpenProject is an open-source, web-based project management software. For OpenProject version 16.6.1 and below, a registered administrator can execute arbitrary command by configuring sendmail binary path and sending a test email. This issue has been patched in version 16.6.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*

History

14 Jan 2026, 22:26

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
First Time Openproject openproject
Openproject
CPE cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*
References () https://github.com/opf/openproject/releases/tag/v16.6.2 - () https://github.com/opf/openproject/releases/tag/v16.6.2 - Release Notes
References () https://github.com/opf/openproject/security/advisories/GHSA-9vrv-7h26-c7jc - () https://github.com/opf/openproject/security/advisories/GHSA-9vrv-7h26-c7jc - Vendor Advisory

10 Jan 2026, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-10 02:15

Updated : 2026-01-14 22:26


NVD link : CVE-2026-22601

Mitre link : CVE-2026-22601

CVE.ORG link : CVE-2026-22601


JSON object : View

Products Affected

openproject

  • openproject
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')