An authenticated attacker with minimal permissions can exploit a SQL injection in the WorkTime server "widget" API endpoint to inject SQL queries. If the Firebird backend is used, attackers are able to retrieve all data from the database backend. If the MSSQL backend is used the attacker can execute arbitrary SQL statements on the database backend and gain access to sensitive data.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
The vendor did not respond to our communication attempts anymore. It is currently as of February 2026 unclear, whether a patch is available. Please contact the vendor to request a patch for the identified critical security issues.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://r.sec-consult.com/worktime |
|
History
Thu, 19 Feb 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated attacker with minimal permissions can exploit a SQL injection in the WorkTime server "widget" API endpoint to inject SQL queries. If the Firebird backend is used, attackers are able to retrieve all data from the database backend. If the MSSQL backend is used the attacker can execute arbitrary SQL statements on the database backend and gain access to sensitive data. | |
| Title | SQL Injection in NesterSoft WorkTime | |
| Weaknesses | CWE-89 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-02-19T10:48:43.486Z
Reserved: 2026-02-04T07:44:30.139Z
Link: CVE-2025-15560
No data.
Status : Received
Published: 2026-02-19T11:15:56.603
Modified: 2026-02-19T11:15:56.603
Link: CVE-2025-15560
No data.
OpenCVE Enrichment
No data.
Weaknesses