{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T00:06:12.226","vulnerabilities":[{"cve":{"id":"CVE-2026-25764","sourceIdentifier":"security-advisories@github.com","published":"2026-02-06T22:16:12.560","lastModified":"2026-02-13T19:04:45.490","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OpenProject is an open-source, web-based project management software. Prior to versions 16.6.7 and 17.0.3, an HTML injection vulnerability occurs in the time tracking function of OpenProject. The application does not escape HTML tags, an attacker with administrator privileges can create a work package with the name containing the HTML tags and add it to the Work package section when creating time tracking. This issue has been patched in versions 16.6.7 and 17.0.3."},{"lang":"es","value":"OpenProject es un software de gestión de proyectos de código abierto y basado en la web. Antes de las versiones 16.6.7 y 17.0.3, una vulnerabilidad de inyección HTML ocurre en la función de seguimiento de tiempo de OpenProject. La aplicación no escapa las etiquetas HTML, un atacante con privilegios de administrador puede crear un paquete de trabajo con el nombre que contiene las etiquetas HTML y añadirlo a la sección de Paquetes de trabajo al crear el seguimiento de tiempo. Este problema ha sido parcheado en las versiones 16.6.7 y 17.0.3."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L","baseScore":3.5,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":0.9,"impactScore":2.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-80"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*","versionEndExcluding":"16.6.7","matchCriteriaId":"A92A6956-8428-458E-8CDC-87124CB065F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.3","matchCriteriaId":"C23460A0-11DE-4F88-A751-5A776EEF6D87"}]}]}],"references":[{"url":"https://github.com/opf/openproject/releases/tag/v16.6.7","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/opf/openproject/releases/tag/v17.0.3","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/opf/openproject/security/advisories/GHSA-q523-c695-h3hp","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}