Логотип exploitDog
bind:CVE-2026-23626
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-23626

Количество 2

Количество 2

nvd логотип

CVE-2026-23626

21 день назад

Kimai is a web-based multi-user time-tracking application. Prior to version 2.46.0, Kimai's export functionality uses a Twig sandbox with an overly permissive security policy (`DefaultPolicy`) that allows arbitrary method calls on objects available in the template context. An authenticated user with export permissions can deploy a malicious Twig template that extracts sensitive information including environment variables, all user password hashes, serialized session tokens, and CSRF tokens. Version 2.46.0 patches this issue.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-jg2j-2w24-54cg

19 дней назад

Kimai has an Authenticated Server-Side Template Injection (SSTI)

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-23626

Kimai is a web-based multi-user time-tracking application. Prior to version 2.46.0, Kimai's export functionality uses a Twig sandbox with an overly permissive security policy (`DefaultPolicy`) that allows arbitrary method calls on objects available in the template context. An authenticated user with export permissions can deploy a malicious Twig template that extracts sensitive information including environment variables, all user password hashes, serialized session tokens, and CSRF tokens. Version 2.46.0 patches this issue.

CVSS3: 6.8
0%
Низкий
21 день назад
github логотип
GHSA-jg2j-2w24-54cg

Kimai has an Authenticated Server-Side Template Injection (SSTI)

CVSS3: 6.8
0%
Низкий
19 дней назад

Уязвимостей на страницу