OpenProject is an open-source, web-based project management software. Prior to 17.2.0, an authenticated project member with BCF import permissions can upload a crafted .bcf archive where the <Snapshot> value in markup.bcf is manipulated to contain an absolute or traversal local path (for example: /etc/passwd or ../../../../etc/passwd). During import, this untrusted <Snapshot> value is used as file.path during attachment processing. As a result, local filesystem content can be read outside the intended ZIP scope. This results in an Arbitrary File Read (AFR) within the read permissions of the OpenProject application user. This vulnerability is fixed in 17.2.0.
References
| Link | Resource |
|---|---|
| https://github.com/opf/openproject/security/advisories/GHSA-q8c5-vpmm-xrxv | Vendor Advisory |
Configurations
History
17 Mar 2026, 15:53
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| First Time |
Openproject openproject
Openproject |
|
| References | () https://github.com/opf/openproject/security/advisories/GHSA-q8c5-vpmm-xrxv - Vendor Advisory |
11 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-11 16:16
Updated : 2026-03-17 15:53
NVD link : CVE-2026-30234
Mitre link : CVE-2026-30234
CVE.ORG link : CVE-2026-30234
JSON object : View
Products Affected
openproject
- openproject
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
