An authenticated attacker with minimal permissions can exploit a SQL injection in the WorkTime server "widget" API endpoint to inject SQL queries. If the Firebird backend is used, attackers are able to retrieve all data from the database backend. If the MSSQL backend is used the attacker can execute arbitrary SQL statements on the database backend and gain access to sensitive data.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://r.sec-consult.com/worktime |
|
History
Thu, 19 Feb 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated attacker with minimal permissions can exploit a SQL injection in the WorkTime server "widget" API endpoint to inject SQL queries. If the Firebird backend is used, attackers are able to retrieve all data from the database backend. If the MSSQL backend is used the attacker can execute arbitrary SQL statements on the database backend and gain access to sensitive data. | |
| Title | SQL Injection in NesterSoft WorkTime | |
| Weaknesses | CWE-89 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-02-19T10:48:43.486Z
Reserved: 2026-02-04T07:44:30.139Z
Link: CVE-2025-15560
No data.
Status : Awaiting Analysis
Published: 2026-02-19T11:15:56.603
Modified: 2026-02-19T15:52:39.260
Link: CVE-2025-15560
No data.
OpenCVE Enrichment
No data.