Kimai

Kimai

12 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 17.04.2026 22:35:53
  • Zuletzt bearbeitet 20.04.2026 19:03:07

Kimai is an open-source time tracking application. In versions 2.52.0 and below, the User Preferences API endpoint (PATCH /api/users/{id}/preferences) applies submitted preference values without checking the isEnabled() flag on preference objects. Al...

  • EPSS 0.03%
  • Veröffentlicht 17.04.2026 22:31:29
  • Zuletzt bearbeitet 20.04.2026 19:03:07

Kimai is an open-source time tracking application. In versions 1.16.3 through 2.52.0, the escapeForHtml() function in KimaiEscape.js does not escape double quote or single quote characters. When a user's profile alias is inserted into an HTML attribu...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 06.03.2026 04:49:08
  • Zuletzt bearbeitet 10.03.2026 19:52:21

Kimai is a web-based multi-user time-tracking application. Prior to version 2.51.0, "GET /api/invoices/{id}" only checks the role-based view_invoice permission but does not verify the requesting user has access to the invoice's customer. Any user wit...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 11.02.2026 14:56:54
  • Zuletzt bearbeitet 19.02.2026 21:37:07

Kimai 2 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts into timesheet descriptions. Attackers can insert SVG-based XSS payloads in the description field to execute arbitrary JavaScript when ...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 18.01.2026 22:45:35
  • Zuletzt bearbeitet 18.02.2026 16:30:19

Kimai is a web-based multi-user time-tracking application. Prior to version 2.46.0, Kimai's export functionality uses a Twig sandbox with an overly permissive security policy (`DefaultPolicy`) that allows arbitrary method calls on objects available i...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 19.12.2025 21:15:52
  • Zuletzt bearbeitet 19.02.2026 21:53:08

Kimai 1.30.10 contains a SameSite cookie vulnerability that allows attackers to steal user session cookies through malicious exploitation. Attackers can trick victims into executing a crafted PHP script that captures and writes session cookie informa...

Exploit
  • EPSS 42.94%
  • Veröffentlicht 31.07.2025 14:56:59
  • Zuletzt bearbeitet 15.04.2026 00:35:42

An unauthenticated SQL injection vulnerability exists in Kimai version 0.9.2.x via the db_restore.php endpoint. The flaw allows attackers to inject arbitrary SQL queries into the dates[] POST parameter, enabling file write via INTO OUTFILE under spec...

  • EPSS 0.26%
  • Veröffentlicht 07.05.2024 16:15:08
  • Zuletzt bearbeitet 10.10.2025 18:16:29

A vulnerability was found in Kimai up to 2.15.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Session Handler. The manipulation of the argument PHPSESSIONID leads to information disclosure. The a...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 28.03.2024 14:15:14
  • Zuletzt bearbeitet 10.10.2025 17:30:34

Kimai is a web-based multi-user time-tracking application. The permission `view_other_timesheet` performs differently for the Kimai UI and the API, thus returning unexpected data through the API. When setting the `view_other_timesheet` permission to ...

Exploit
  • EPSS 2.27%
  • Veröffentlicht 31.10.2023 16:15:09
  • Zuletzt bearbeitet 21.11.2024 08:28:09

Kimai is a web-based multi-user time-tracking application. Versions prior to 2.1.0 are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads...