Worktime

5 CVEs product

Monthly

CVE-2025-15563 MEDIUM This Month

Any unauthenticated user can reset the WorkTime on-prem database configuration by sending a specific HTTP request to the WorkTime server. No authorization check is applied here. [CVSS 5.3 MEDIUM]

Authentication Bypass Worktime
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-15562 MEDIUM This Month

The server API endpoint /report/internet/urls reflects received data into the HTML response without applying proper encoding or filtering. This allows an attacker to execute arbitrary JavaScript in the victim's browser if the victim opens a URL prepared by the attacker. [CVSS 6.1 MEDIUM]

RCE XSS Worktime
NVD
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-15561 HIGH This Week

An attacker can exploit the update behavior of the WorkTime monitoring daemon to elevate privileges on the local system to NT Authority\SYSTEM. A malicious executable must be named  WTWatch.exe and dropped in the C:\ProgramData\wta\ClientExe directory, which is writable by "Everyone". [CVSS 7.8 HIGH]

Privilege Escalation Worktime
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-15560 HIGH This Week

An authenticated attacker with minimal permissions can exploit a SQL injection in the WorkTime server "widget" API endpoint to inject SQL queries. If the Firebird backend is used, attackers are able to retrieve all data from the database backend. [CVSS 8.8 HIGH]

Mssql SQLi Worktime
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2025-15559 CRITICAL Act Now

Unauthenticated OS command injection in NesterSoft WorkTime via report generation API. Allows executing arbitrary commands.

Command Injection Worktime
NVD
CVSS 3.1
9.8
EPSS
0.2%
CVE-2025-15563
EPSS 0% CVSS 5.3
MEDIUM This Month

Any unauthenticated user can reset the WorkTime on-prem database configuration by sending a specific HTTP request to the WorkTime server. No authorization check is applied here. [CVSS 5.3 MEDIUM]

Authentication Bypass Worktime
NVD
CVE-2025-15562
EPSS 0% CVSS 6.1
MEDIUM This Month

The server API endpoint /report/internet/urls reflects received data into the HTML response without applying proper encoding or filtering. This allows an attacker to execute arbitrary JavaScript in the victim's browser if the victim opens a URL prepared by the attacker. [CVSS 6.1 MEDIUM]

RCE XSS Worktime
NVD
CVE-2025-15561
EPSS 0% CVSS 7.8
HIGH This Week

An attacker can exploit the update behavior of the WorkTime monitoring daemon to elevate privileges on the local system to NT Authority\SYSTEM. A malicious executable must be named  WTWatch.exe and dropped in the C:\ProgramData\wta\ClientExe directory, which is writable by "Everyone". [CVSS 7.8 HIGH]

Privilege Escalation Worktime
NVD
CVE-2025-15560
EPSS 0% CVSS 8.8
HIGH This Week

An authenticated attacker with minimal permissions can exploit a SQL injection in the WorkTime server "widget" API endpoint to inject SQL queries. If the Firebird backend is used, attackers are able to retrieve all data from the database backend. [CVSS 8.8 HIGH]

Mssql SQLi Worktime
NVD
CVE-2025-15559
EPSS 0% CVSS 9.8
CRITICAL Act Now

Unauthenticated OS command injection in NesterSoft WorkTime via report generation API. Allows executing arbitrary commands.

Command Injection Worktime
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy