Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-32703 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Stored XSS in OpenProject's **Repositories** module. πŸ“‰ **Consequences**: Attackers inject malicious scripts via **unescaped filenames**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-79** (Improper Neutralization of Input During Web Page Generation). πŸ› **Flaw**: The system fails to properly **escape/display** filenames in the Repositories module.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Products**: **OpenProject** (by opf). πŸ“… **Vulnerable Versions**: < 16.6.9, < 17.0.6, < 17.1.3, and < 17.2.1. πŸ“Œ **Component**: Specifically the **Repositories** module handling file uploads/names.…

Q4What can hackers do? (Privileges/Data)

πŸ’» **Hacker Actions**: Execute arbitrary JavaScript in victim's browser. πŸ•΅οΈ **Privileges**: Steal **cookies**, **session tokens**, or **personal data**.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”’ **Threshold**: Medium. πŸ›‘ **Auth Required**: Yes, **PR:L** (Low Privileges) needed. Attacker must be a **logged-in user**. 🀝 **UI Required**: Yes, **UI:R** (User Interaction) needed.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: **No**. The `pocs` array is empty in the data. πŸ“° **Advisory**: Confirmed via GitHub Security Advisory (GHSA-p423-72h4-fjvp).…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **OpenProject** instances running versions < 17.2.1. πŸ“‚ **Manual Test**: Upload a file with a **script tag** in the filename (e.g., `<img src=x onerror=alert(1)>`).…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **Yes**. Patched in **OpenProject 17.2.1** (and earlier minor updates). πŸ”„ **Action**: Upgrade immediately to the latest stable version.…

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1. **Restrict Access**: Limit Repository module access to trusted admins only. 2. **Input Sanitization**: Manually sanitize filenames before upload (if possible via custom hooks). 3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **High**. πŸ“… **Published**: 2026-03-18. πŸ“ˆ **CVSS**: High (H) impact on Confidentiality, Integrity, Availability. πŸš€ **Priority**: Patch immediately upon upgrade.…