CVE-2026-24775
Unknown Unknown - Not Provided
OpenProject BlockNote Extension Improper Input Validation Allows SSRF

Publication date: 2026-01-28

Last updated on: 2026-02-12

Assigner: GitHub, Inc.

Description
OpenProject is an open-source, web-based project management software. In the new editor for collaborative documents based on BlockNote, OpenProject maintainers added a custom extension in OpenProject version 17.0.0 that allows to mention OpenProject work packages in the document. To show work package details, the editor loads details about the work package via the OpenProject API. For this API call, the extension to the BlockNote editor did not properly validate the given work package ID to be only a number. This allowed an attacker to generate a document with relative links that upon opening could make arbitrary `GET` requests to any URL within the OpenProject instance. This issue was patched in version version 0.0.22 of op-blocknote-extensions, which was shipped with OpenProject 17.0.2. If users cannot update immediately to version 17.0.2 of OpenProject, administrators can disable collaborative document editing in Settings -> Documents -> Real time collaboration -> Disable.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-28
Last Modified
2026-02-12
Generated
2026-05-07
AI Q&A
2026-01-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openproject openproject From 17.0.0 (inc) to 17.0.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the new editor for collaborative documents in OpenProject version 17.0.0, specifically in a custom extension that allows mentioning work packages. The extension did not properly validate the work package ID input to ensure it was only a number. This flaw allowed an attacker to create a document with relative links that, when opened, could trigger arbitrary GET requests to any URL within the OpenProject instance, potentially exposing internal data or functionality.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to make arbitrary GET requests within the OpenProject instance by exploiting the improper validation of work package IDs. This could lead to unauthorized access to internal URLs and potentially sensitive information or functionality within the OpenProject environment. It may also disrupt availability as indicated by the CVSS score's high impact on availability.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, update OpenProject to version 17.0.2 or later, which includes the patched version 0.0.22 of op-blocknote-extensions. If updating is not possible immediately, disable collaborative document editing by navigating to Settings -> Documents -> Real time collaboration and selecting Disable.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart