{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T20:01:29.919","vulnerabilities":[{"cve":{"id":"CVE-2025-24892","sourceIdentifier":"security-advisories@github.com","published":"2025-02-10T16:15:39.310","lastModified":"2025-08-27T02:09:35.983","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OpenProject is open-source, web-based project management software. In versions prior to 15.2.1, the application fails to properly sanitize user input before displaying it in the Group Management section. Groups created with HTML script tags are not properly escaped before rendering them in a project. The issue has been resolved in OpenProject version 15.2.1. Those who are unable to upgrade may apply the patch manually."},{"lang":"es","value":"OpenProject es un software de gestión de proyectos basado en la web y de código abierto. En versiones anteriores a la 15.2.1, la aplicación no puede depurar correctamente la entrada del usuario antes de mostrarla en la sección Gestión de grupos. Los grupos creados con etiquetas de script HTML no se escapan correctamente antes de mostrarlos en un proyecto. El problema se ha resuelto en la versión 15.2.1 de OpenProject. Aquellos que no puedan actualizar pueden aplicar el parche manualmente."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseScore":3.5,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*","versionEndExcluding":"15.2.1","matchCriteriaId":"FFB535C5-5B73-4EBF-A371-D0745DDE0614"}]}]}],"references":[{"url":"https://github.com/opf/openproject/pull/17783","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/opf/openproject/security/advisories/GHSA-mg4q-ghvh-cm2j","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://patch-diff.githubusercontent.com/raw/opf/openproject/pull/17783.patch","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://www.openproject.org/docs/release-notes/12-5-1","source":"security-advisories@github.com","tags":["Release Notes"]}]}}]}