CVE-2025-15563
- EPSS 0.05%
- Veröffentlicht 19.02.2026 11:01:56
- Zuletzt bearbeitet 26.02.2026 03:01:05
Any unauthenticated user can reset the WorkTime on-prem database configuration by sending a specific HTTP request to the WorkTime server. No authorization check is applied here.
CVE-2025-15562
- EPSS 0.03%
- Veröffentlicht 19.02.2026 10:54:52
- Zuletzt bearbeitet 26.02.2026 02:58:17
The server API endpoint /report/internet/urls reflects received data into the HTML response without applying proper encoding or filtering. This allows an attacker to execute arbitrary JavaScript in the victim's browser if the victim opens a URL prepa...
CVE-2025-15561
- EPSS 0.01%
- Veröffentlicht 19.02.2026 10:53:18
- Zuletzt bearbeitet 26.02.2026 02:58:45
An attacker can exploit the update behavior of the WorkTime monitoring daemon to elevate privileges on the local system to NT Authority\SYSTEM. A malicious executable must be named WTWatch.exe and dropped in the C:\ProgramData\wta\ClientExe director...
CVE-2025-15560
- EPSS 0.03%
- Veröffentlicht 19.02.2026 10:48:43
- Zuletzt bearbeitet 26.02.2026 02:58:58
An authenticated attacker with minimal permissions can exploit a SQL injection in the WorkTime server "widget" API endpoint to inject SQL queries. If the Firebird backend is used, attackers are able to retrieve all data from the database backend. If ...
CVE-2025-15559
- EPSS 0.16%
- Veröffentlicht 19.02.2026 10:45:34
- Zuletzt bearbeitet 03.03.2026 16:39:28
An unauthenticated attacker can inject OS commands when calling a server API endpoint in NesterSoft WorkTime. The server API call to generate and download the WorkTime client from the WorkTime server is vulnerable in the “guid” parameter. This allows...