Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-22600

CVE-2026-22600: OpenProject LFR Vulnerability via PDF Export

CVE-2026-22600 is a Local File Read vulnerability in OpenProject's PDF export that allows attackers to access sensitive files via malicious SVG uploads. This article covers the technical details, affected versions, and patches.

Updated: January 22, 2026

CVE-2026-22600 Overview

CVE-2026-22600 is a Local File Read (LFR) vulnerability affecting OpenProject, an open-source, web-based project management software. The vulnerability exists in the work package PDF export functionality and can be exploited through specially crafted SVG files disguised as PNG images. When these malicious attachments are processed during PDF export, they trigger ImageMagick's text coder, allowing attackers to read arbitrary local files accessible to the application user.

Critical Impact

Attackers with attachment upload permissions can read sensitive system files including /etc/passwd, project configuration files, and private project data through exploitation of the ImageMagick image processing backend.

Affected Products

  • OpenProject versions prior to 16.6.4
  • OpenProject installations using ImageMagick for image processing
  • OpenProject deployments with work package PDF export functionality enabled

Discovery Timeline

  • 2026-01-10 - CVE CVE-2026-22600 published to NVD
  • 2026-01-13 - Last updated in NVD database

Technical Details for CVE-2026-22600

Vulnerability Analysis

This vulnerability exploits a weakness in OpenProject's handling of uploaded image attachments during PDF export operations. The attack chain begins when a user uploads a specially crafted SVG file with a PNG extension to a work package. OpenProject's backend relies on ImageMagick for image processing tasks, including resizing attachments for PDF generation.

When the work package containing the malicious attachment is exported to PDF, ImageMagick attempts to process and resize the image. The crafted SVG payload triggers ImageMagick's text: coder, which is designed to read text files and embed their contents. This behavior is exploited to read arbitrary files from the server's filesystem that the application user has permissions to access.

The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), as it enables unauthorized access to confidential data through improper handling of user-supplied content.

Root Cause

The root cause of this vulnerability lies in insufficient validation of uploaded file content. While OpenProject may check file extensions, the actual content type is not properly verified before being passed to ImageMagick for processing. ImageMagick's text: coder feature, when triggered by the malicious SVG payload, interprets file paths within the SVG and reads their contents, embedding them in the processed output.

This represents a classic case of inadequate input validation combined with unsafe delegation to an image processing library that has known security-sensitive features. The lack of proper ImageMagick policy restrictions to disable dangerous coders exacerbates the issue.

Attack Vector

The attack requires an authenticated user with permissions to upload attachments to containers that support PDF export (such as work packages). The attacker uploads a malicious SVG file disguised with a .png extension. This file contains payload directives that reference local file paths using ImageMagick's text: pseudo-protocol.

When any user (including the attacker) triggers a PDF export of the work package, the backend processes all attachments. During the resize operation, ImageMagick parses the SVG content and executes the embedded file read instructions. The contents of targeted files (e.g., /etc/passwd, configuration files, or sensitive project data) are then included in the processing output or can be exfiltrated through error messages or the resulting PDF.

The attack can be performed remotely over the network by any authenticated user with the requisite upload permissions. No user interaction beyond the initial PDF export trigger is required.

Detection Methods for CVE-2026-22600

Indicators of Compromise

  • Presence of SVG files with non-SVG extensions (e.g., .png, .jpg) in work package attachments
  • Unexpected file access patterns in application logs targeting sensitive files like /etc/passwd or configuration directories
  • ImageMagick error logs containing references to the text: coder or file path inclusions
  • Unusual PDF export requests, especially batch exports of work packages with recently uploaded attachments

Detection Strategies

  • Implement file content inspection for uploaded attachments to detect SVG content regardless of file extension
  • Monitor ImageMagick processing logs for invocations of potentially dangerous coders (text:, url:, label:)
  • Review access logs for patterns of PDF export followed by immediate download of the same work packages
  • Deploy web application firewall (WAF) rules to detect SVG-based file inclusion patterns in uploads

Monitoring Recommendations

  • Enable verbose logging for the OpenProject attachment processing pipeline
  • Configure alerts for ImageMagick coder warnings or errors during PDF generation
  • Monitor filesystem access patterns of the OpenProject application user for reads of sensitive system files
  • Implement audit logging for all PDF export operations with correlation to recent attachment uploads

How to Mitigate CVE-2026-22600

Immediate Actions Required

  • Upgrade OpenProject to version 16.6.4 or later immediately
  • Review recently uploaded attachments for suspicious files, particularly those with image extensions but SVG content
  • Audit PDF export logs for any signs of prior exploitation
  • Restrict attachment upload permissions to trusted users until patching is complete

Patch Information

The vulnerability has been patched in OpenProject version 16.6.4. Organizations should upgrade to this version or later to remediate the issue. The patch addresses the improper handling of SVG files during ImageMagick processing.

For detailed patch information, refer to the GitHub Release Notes v16.6.4 and the GitHub Security Advisory GHSA-m8f2-cwpq-vvhh.

Organizations unable to upgrade immediately may apply the patch manually as referenced in the security advisory.

Workarounds

  • Disable the PDF export functionality for work packages until the patch can be applied
  • Implement strict ImageMagick policy configurations to disable the text:, url:, and label: coders
  • Configure file upload validation to reject files where content type does not match the declared extension
  • Restrict work package attachment upload permissions to administrative or highly trusted users only
bash
# ImageMagick policy configuration to disable dangerous coders
# Add to /etc/ImageMagick-6/policy.xml or /etc/ImageMagick-7/policy.xml
# Disable text coder to prevent file read attacks
<policy domain="coder" rights="none" pattern="TEXT" />
<policy domain="coder" rights="none" pattern="URL" />
<policy domain="coder" rights="none" pattern="LABEL" />
<policy domain="coder" rights="none" pattern="MVG" />
<policy domain="coder" rights="none" pattern="MSL" />

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechImagemagick

  • SeverityCRITICAL

  • CVSS Score9.1

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-200
  • Technical References
  • GitHub Release Notes v16.6.4

  • GitHub Security Advisory GHSA-m8f2-cwpq-vvhh
  • Related CVEs
  • CVE-2026-24481: ImageMagick Information Disclosure Flaw

  • CVE-2022-44268: ImageMagick Information Disclosure Flaw

  • CVE-2026-40312: ImageMagick MSL Decoder DoS Vulnerability

  • CVE-2026-40311: ImageMagick Use-After-Free Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English