Tuleap does not sanitize properly user inputs when constructing SQL queries in the CVS module.
Impact
An authenticated attacker could execute arbitrary SQL queries.
CVSSv3 score: 8.8 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Proof of concept
One of the possible way to demonstrate the vulnerabilities is with the page <tuleap_url>/cvs/viewvc.php is exploitable via the parameter root.
The vulnerability can be demonstrated by putting ' in the parameter, when the vulnerability is present a notice will be raised.
References
https://cwe.mitre.org/data/definitions/89.html
https://www.owasp.org/index.php/SQL_Injection