No advisories yet.
Solution
The vendor did not respond to our communication attempts anymore. It is currently as of February 2026 unclear, whether a patch is available. Please contact the vendor to request a patch for the identified critical security issues.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://r.sec-consult.com/worktime |
|
Mon, 23 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nestersoft
Nestersoft worktime |
|
| Vendors & Products |
Nestersoft
Nestersoft worktime |
Thu, 19 Feb 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated attacker with minimal permissions can exploit a SQL injection in the WorkTime server "widget" API endpoint to inject SQL queries. If the Firebird backend is used, attackers are able to retrieve all data from the database backend. If the MSSQL backend is used the attacker can execute arbitrary SQL statements on the database backend and gain access to sensitive data. | |
| Title | SQL Injection in NesterSoft WorkTime | |
| Weaknesses | CWE-89 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-02-23T18:29:08.299Z
Reserved: 2026-02-04T07:44:30.139Z
Link: CVE-2025-15560
Updated: 2026-02-23T18:28:59.615Z
Status : Undergoing Analysis
Published: 2026-02-19T11:15:56.603
Modified: 2026-02-23T19:22:53.540
Link: CVE-2025-15560
No data.
OpenCVE Enrichment
Updated: 2026-02-20T10:07:17Z