Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.5

OpenProject: Malicious File Upload Allows Access to Local Files

CVE-2026-30234
Summary

An attacker with BCF import permissions can upload a specially crafted file to access local files on the server, potentially revealing sensitive information. This issue has been fixed in version 17.2.0. Users should update to this version as soon as possible to protect their data.

Original title
OpenProject is an open-source, web-based project management software. Prior to 17.2.0, an authenticated project member with BCF import permissions can upload a crafted .bcf archive where the <Snaps...
Original description
OpenProject is an open-source, web-based project management software. Prior to 17.2.0, an authenticated project member with BCF import permissions can upload a crafted .bcf archive where the <Snapshot> value in markup.bcf is manipulated to contain an absolute or traversal local path (for example: /etc/passwd or ../../../../etc/passwd). During import, this untrusted <Snapshot> value is used as file.path during attachment processing. As a result, local filesystem content can be read outside the intended ZIP scope. This results in an Arbitrary File Read (AFR) within the read permissions of the OpenProject application user. This vulnerability is fixed in 17.2.0.
nvd CVSS3.1 6.5
Vulnerability type
CWE-22 Path Traversal
Published: 11 Mar 2026 · Updated: 13 Mar 2026 · First seen: 11 Mar 2026