Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-32698 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: OpenProject SQL Injection (CWE-89). Custom field names aren't sanitized in SQL queries.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-89** (SQL Injection). The flaw lies in **improper cleaning** of custom field names before inserting them into SQL queries.…

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected Versions**: <br>β€’ OpenProject **16.6.9** and earlier <br>β€’ OpenProject **17.0.6** and earlier <br>β€’ OpenProject **17.1.3** and earlier <br>β€’ OpenProject **17.2.1** and earlier πŸ“¦ Vendor: **opf** (OpenProject …

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: <br>1. **SQL Injection**: Manipulate database queries. <br>2. **Remote Code Execution (RCE)**: Inject **Ruby code** via Git operations. <br>3.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Exploitation Threshold**: **Medium**. <br>β€’ **Network**: Remote (AV:N) <br>β€’ **Complexity**: Low (AC:L) <br>β€’ **Privileges**: **Required** (PR:H) - Attacker needs authenticated access.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ§ͺ **Public Exploit**: **No** public PoC/Exploit listed in the data (POCs: []). However, the severity (CVSS 9.8) and clear attack path (SQL -> Git -> RCE) make it highly attractive for future exploitation.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1. Verify OpenProject version against the **affected list** above. <br>2. Scan for **SQL injection** patterns in custom field inputs. <br>3.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **Yes**. The advisory (GHSA-jqhf-rf9x-9rhx) implies fixed versions exist: <br>β€’ 16.6.10+ <br>β€’ 17.0.7+ <br>β€’ 17.1.4+ <br>β€’ 17.2.2+ πŸ”„ **Action**: Upgrade immediately to the latest patched version.

Q9What if no patch? (Workaround)

🚧 **Workaround (If No Patch)**: <br>1. **Restrict Access**: Limit authentication to trusted IPs/users only. <br>2. **Input Sanitization**: Manually validate/custom field name inputs if possible (hard for web apps).…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL (P1)**. <br>β€’ CVSS Score: **9.8** (Critical). <br>β€’ Impact: **RCE** via SQLi. <br>β€’ Auth Required: Yes, but common in enterprise apps. πŸš€ **Recommendation**: Patch **immediately**. Do not wait.