Titra is open source project time tracking software. In versions 0.99.49 and below, an API has a Mass Assignment vulnerability which allows authenticated users to inject arbitrary fields into time entries, bypassing business logic controls via the customfields parameter. The affected endpoint uses the JavaScript spread operator (...customfields) to merge user-controlled input directly into the database document. While customfields is validated as an Object type, there is no validation of which keys are permitted inside that object. This allows attackers to overwrite protected fields such as userId, hours, and state. The issue is fixed in version 0.99.50.
History

Thu, 08 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Kromit
Kromit titra
Vendors & Products Kromit
Kromit titra

Wed, 07 Jan 2026 23:45:00 +0000

Type Values Removed Values Added
Description Titra is open source project time tracking software. In versions 0.99.49 and below, an API has a Mass Assignment vulnerability which allows authenticated users to inject arbitrary fields into time entries, bypassing business logic controls via the customfields parameter. The affected endpoint uses the JavaScript spread operator (...customfields) to merge user-controlled input directly into the database document. While customfields is validated as an Object type, there is no validation of which keys are permitted inside that object. This allows attackers to overwrite protected fields such as userId, hours, and state. The issue is fixed in version 0.99.50.
Title Titra API Contains Mass Assignment Vulnerability
Weaknesses CWE-915
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-08T18:16:33.468Z

Reserved: 2026-01-02T18:45:27.397Z

Link: CVE-2026-21695

cve-icon Vulnrichment

Updated: 2026-01-08T15:06:17.677Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-01-08T00:15:59.833

Modified: 2026-01-08T19:15:58.697

Link: CVE-2026-21695

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-08T09:47:58Z