OpenProject is an open-source, web-based project management software. Prior to 17.2.0, this vulnerability occurs due to improper validation of OpenProject’s Markdown rendering, specifically in the hyperlink handling. This allows an attacker to inject malicious hyperlink payloads that perform DOM clobbering. DOM clobbering can crash or blank the entire page by overwriting native DOM functions with HTML elements, causing critical JavaScript calls to throw runtime errors during application initialization and halt further execution. This vulnerability is fixed in 17.2.0.
References
| Link | Resource |
|---|---|
| https://github.com/opf/openproject/security/advisories/GHSA-9rv2-9xv5-gpq8 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-11 17:16
Updated : 2026-03-13 19:22
NVD link : CVE-2026-30235
Mitre link : CVE-2026-30235
CVE.ORG link : CVE-2026-30235
JSON object : View
Products Affected
openproject
- openproject
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
