{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-32703","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-13T14:33:42.823Z","datePublished":"2026-03-18T21:04:16.982Z","dateUpdated":"2026-03-19T16:14:11.504Z"},"containers":{"cna":{"title":"OpenProject's repository files are served with the MIME type allowing them to be used to bypass Content Security Policy","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/opf/openproject/security/advisories/GHSA-p423-72h4-fjvp","tags":["x_refsource_CONFIRM"],"url":"https://github.com/opf/openproject/security/advisories/GHSA-p423-72h4-fjvp"}],"affected":[{"vendor":"opf","product":"openproject","versions":[{"version":"< 16.6.9","status":"affected"},{"version":">= 17.0.0, < 17.0.6","status":"affected"},{"version":">= 17.1.0, < 17.1.3","status":"affected"},{"version":">= 17.2.0, < 17.2.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-18T21:04:16.982Z"},"descriptions":[{"lang":"en","value":"OpenProject is an open-source, web-based project management software. In versions prior to 16.6.9, 17.0.6, 17.1.3, and 17.2.1, the Repositories module did not properly escape filenames displayed from repositories. This allowed an attacker with push access into the repository to create commits with filenames that included HTML code that was injected in the page without proper sanitation. This allowed a persisted XSS attack against all members of this project that accessed the repositories page to display a changeset where the maliciously crafted file was deleted. Versions 16.6.9, 17.0.6, 17.1.3, and 17.2.1 fix the issue."}],"source":{"advisory":"GHSA-p423-72h4-fjvp","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-19T16:13:58.033965Z","id":"CVE-2026-32703","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-19T16:14:11.504Z"}}]}}