Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-22600— OpenProject is Vulnerable to Arbitrary File Read via ImageMagick SVG Coder

CVSS 9.1 · Critical EPSS 0.02% · P4
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-22600

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
OpenProject is Vulnerable to Arbitrary File Read via ImageMagick SVG Coder
Source: NVD (National Vulnerability Database)
Vulnerability Description
OpenProject is an open-source, web-based project management software. A Local File Read (LFR) vulnerability exists in the work package PDF export functionality of OpenProject prior to version 16.6.4. By uploading a specially crafted SVG file (disguised as a PNG) as a work package attachment, an attacker can exploit the backend image processing engine (ImageMagick). When the work package is exported to PDF, the backend attempts to resize the image, triggering the ImageMagick text: coder. This allows an attacker to read arbitrary local files that the application user has permissions to access (e.g., /etc/passwd, all project configuration files, private project data, etc.). The attack requires permissions to upload attachments to a container that can be exported to PDF, such as a work package. The issue has been patched in version 16.6.4. Those who are unable to upgrade may apply the patch manually.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenProject 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenProject是OpenProject开源的一个基于Web的项目管理软件。 OpenProject 16.6.4之前版本存在信息泄露漏洞,该漏洞源于工作包PDF导出功能存在本地文件读取漏洞,攻击者可通过上传特制SVG文件,利用后端图像处理引擎读取任意本地文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
opfopenproject < 16.6.4 -

II. Public POCs for CVE-2026-22600

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-22600

登录查看更多情报信息。

Same Patch Batch · opf · 2026-01-10 · 6 CVEs total

CVE-2026-226054.3 MEDIUMOpenProject is Vulnerable to Insecure Direct Object Reference in Meetings
CVE-2026-226023.5 LOWOpenProject is Vulnerable to User Enumeration via User ID
CVE-2026-22604OpenProject is vulnerable to user enumeration via the change password function
CVE-2026-22601OpenProject is Vulnerable to Code Execution in E-Mail function
CVE-2026-22603OpenProject has no protection against brute-force attacks in the Change Password function

IV. Related Vulnerabilities

V. Comments for CVE-2026-22600

No comments yet


Leave a comment