CVE-2026-34717
OpenProject · OpenProject
A SQL injection vulnerability in OpenProject's reporting module allows attackers to execute unauthorized database queries via unparameterized user input.
Executive summary
OpenProject versions prior to 17.2.3 are vulnerable to a critical SQL injection flaw that could result in total database compromise and data exfiltration.
Vulnerability
The "=n" operator in the reporting module fails to parameterize user input before embedding it into SQL WHERE clauses. This allows an attacker to inject malicious SQL commands directly into the application's database queries.
Business impact
SQL injection is a severe threat that can lead to the unauthorized disclosure of sensitive project data, user credentials, and intellectual property. An attacker could potentially modify or delete database records, leading to data loss and significant operational disruption. The CVSS score of 9.9 reflects the near-total impact on data integrity and confidentiality.
Remediation
Immediate Action: Upgrade OpenProject to version 17.2.3 or later immediately to implement the necessary parameterization for SQL queries.
Proactive Monitoring: Review database logs for unusual query patterns or syntax errors that may indicate SQL injection attempts.
Compensating Controls: Deploy a Web Application Firewall (WAF) with SQL injection protection rules to filter malicious payloads before they reach the application.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Organizations hosting OpenProject must apply the 17.2.3 patch without delay. SQL injection remains one of the most dangerous and commonly exploited vulnerability types; securing the database layer is critical to maintaining the security of the entire project management environment.