An authenticated attacker with minimal permissions can exploit a SQL injection in the WorkTime server "widget" API endpoint to inject SQL queries. If the Firebird backend is used, attackers are able to retrieve all data from the database backend. If the MSSQL backend is used the attacker can execute arbitrary SQL statements on the database backend and gain access to sensitive data.
References
| Link | Resource |
|---|---|
| https://r.sec-consult.com/worktime | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
26 Feb 2026, 02:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://r.sec-consult.com/worktime - Third Party Advisory | |
| CPE | cpe:2.3:a:nestersoft:worktime:*:*:*:*:on-premise:*:*:* cpe:2.3:a:nestersoft:worktime:*:*:*:*:cloud:*:*:* |
|
| First Time |
Nestersoft
Nestersoft worktime |
|
| Summary |
|
23 Feb 2026, 19:22
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
19 Feb 2026, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-19 11:15
Updated : 2026-02-26 02:58
NVD link : CVE-2025-15560
Mitre link : CVE-2025-15560
CVE.ORG link : CVE-2025-15560
JSON object : View
Products Affected
nestersoft
- worktime
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
