FKIE_CVE-2025-15559
Vulnerability from fkie_nvd - Published: 2026-02-19 11:15 - Updated: 2026-03-03 16:39
Severity ?
Summary
An unauthenticated attacker can inject OS commands when calling a server API endpoint in NesterSoft WorkTime. The server API call to generate and download the WorkTime client from the WorkTime server is vulnerable in the “guid” parameter. This allows an attacker to execute arbitrary commands on the WorkTime server as NT Authority\SYSTEM with the highest privileges. Attackers are able to access or manipulate sensitive data and take over the whole server.
References
| URL | Tags | ||
|---|---|---|---|
| 551230f0-3615-47bd-b7cc-93e92e730bbf | https://r.sec-consult.com/worktime | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| nestersoft | worktime | * | |
| nestersoft | worktime | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nestersoft:worktime:*:*:*:*:cloud:*:*:*",
"matchCriteriaId": "F8A53FE8-6F29-462D-B7EB-C3E4F25DBEC3",
"versionEndIncluding": "11.8.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nestersoft:worktime:*:*:*:*:on-premise:*:*:*",
"matchCriteriaId": "0A831FDF-1B71-48B4-BA2D-D2EFB151161A",
"versionEndIncluding": "11.8.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated attacker can inject OS commands when calling a server API endpoint in NesterSoft WorkTime. The server API call to generate and download the WorkTime client from the WorkTime server is vulnerable in the \u201cguid\u201d parameter.\u00a0This allows an attacker to execute arbitrary commands on the WorkTime server as NT Authority\\SYSTEM with the highest privileges. Attackers are able to access or manipulate sensitive data and take over the whole server."
},
{
"lang": "es",
"value": "Un atacante no autenticado puede inyectar comandos del SO al llamar a un endpoint de la API del servidor en NesterSoft WorkTime. La llamada a la API del servidor para generar y descargar el cliente de WorkTime desde el servidor de WorkTime es vulnerable en el par\u00e1metro \u0027guid\u0027. Esto permite a un atacante ejecutar comandos arbitrarios en el servidor de WorkTime como NT Authority\\SYSTEM con los privilegios m\u00e1s altos. Los atacantes pueden acceder o manipular datos sensibles y tomar el control de todo el servidor."
}
],
"id": "CVE-2025-15559",
"lastModified": "2026-03-03T16:39:28.930",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-02-19T11:15:55.423",
"references": [
{
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
"tags": [
"Third Party Advisory"
],
"url": "https://r.sec-consult.com/worktime"
}
],
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…