An unauthenticated attacker can inject OS commands when calling a server API endpoint in NesterSoft WorkTime. The server API call to generate and download the WorkTime client from the WorkTime server is vulnerable in the “guid” parameter. This allows an attacker to execute arbitrary commands on the WorkTime server as NT Authority\SYSTEM with the highest privileges. Attackers are able to access or manipulate sensitive data and take over the whole server.
References
| Link | Resource |
|---|---|
| https://r.sec-consult.com/worktime | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
03 Mar 2026, 16:39
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:nestersoft:worktime:*:*:*:*:on-premise:*:*:* cpe:2.3:a:nestersoft:worktime:*:*:*:*:cloud:*:*:* |
|
| First Time |
Nestersoft
Nestersoft worktime |
|
| References | () https://r.sec-consult.com/worktime - Third Party Advisory |
23 Feb 2026, 19:22
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
19 Feb 2026, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-19 11:15
Updated : 2026-03-03 16:39
NVD link : CVE-2025-15559
Mitre link : CVE-2025-15559
CVE.ORG link : CVE-2025-15559
JSON object : View
Products Affected
nestersoft
- worktime
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
