Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 21 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openproject
Openproject openproject |
|
| CPEs | cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openproject
Openproject openproject |
Fri, 03 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opf
Opf openproject |
|
| Vendors & Products |
Opf
Opf openproject |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenProject is an open-source, web-based project management software. Prior to version 17.2.3, the =n operator in modules/reporting/lib/report/operator.rb:177 embeds user input directly into SQL WHERE clauses without parameterization. This issue has been patched in version 17.2.3. | |
| Title | OpenProject: SQL Injection in Cost Reporting =n Operator via parse_number_string | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T13:01:53.483Z
Reserved: 2026-03-30T18:41:20.753Z
Link: CVE-2026-34717
Updated: 2026-04-03T13:01:48.435Z
Status : Analyzed
Published: 2026-04-02T18:16:33.083
Modified: 2026-04-21T01:03:32.890
Link: CVE-2026-34717
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:17:07Z