CVE-2022-24708: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in anuko timetracker
Anuko Time Tracker is an open source, web-based time tracking application written in PHP. ttUser.class.php in Time Tracker versions prior to 1.20.0.5646 was not escaping primary group name for display. Because of that, it was possible for a logged in user to modify primary group name with elements of JavaScript. Such script could then be executed in user browser on subsequent requests on pages where primary group name was displayed. This is vulnerability has been fixed in version 1.20.0.5646. Users who are unable to upgrade may modify ttUser.class.php to use an additional call to htmlspecialchars when printing group name.
AI Analysis
Technical Summary
CVE-2022-24708 is a medium-severity cross-site scripting (XSS) vulnerability affecting Anuko Time Tracker, an open-source, PHP-based web application used for time tracking. The vulnerability exists in versions prior to 1.20.0.5646 within the ttUser.class.php file, specifically in the handling of the primary group name attribute. The application failed to properly escape the primary group name before rendering it on web pages. This improper neutralization of input (CWE-79) allows a logged-in user to inject malicious JavaScript code into the primary group name field. When other users or the same user subsequently view pages displaying this group name, the injected script executes in their browsers. This can lead to session hijacking, credential theft, or other malicious actions performed in the context of the victim’s browser session. The vulnerability requires the attacker to have authenticated access to modify the primary group name, limiting exploitation to users with at least some level of access. No known public exploits have been reported in the wild. The issue was fixed in version 1.20.0.5646 by adding proper escaping using htmlspecialchars when outputting the group name. For users unable to upgrade, a manual patch involving the addition of htmlspecialchars calls in ttUser.class.php is recommended to mitigate the risk.
Potential Impact
For European organizations using Anuko Time Tracker versions prior to 1.20.0.5646, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and data. Since exploitation requires authenticated access, the threat is limited to insider threats or compromised user accounts. However, successful exploitation could allow attackers to execute arbitrary scripts in the context of other users’ browsers, potentially leading to session hijacking, unauthorized actions, or data leakage. This could disrupt business operations, especially in organizations relying on accurate time tracking for billing, payroll, or project management. The impact on availability is minimal, as the vulnerability does not directly enable denial-of-service conditions. Given the open-source nature of the product and its niche use, the overall risk is moderate but should not be underestimated in environments where sensitive time tracking data is critical.
Mitigation Recommendations
1. Upgrade Anuko Time Tracker to version 1.20.0.5646 or later, which contains the official fix for this vulnerability. 2. If upgrading is not immediately feasible, apply a manual patch by modifying ttUser.class.php to ensure the primary group name is escaped using PHP’s htmlspecialchars function before output. 3. Implement strict access controls and monitor user permissions to limit who can modify group names, reducing the risk of malicious input. 4. Conduct regular code reviews and security testing focusing on input validation and output encoding to prevent similar XSS issues. 5. Educate users about phishing and social engineering risks, as attackers may attempt to leverage this vulnerability in conjunction with other tactics. 6. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers, mitigating the impact of potential XSS payloads. 7. Monitor web application logs for unusual activity related to group name changes or unexpected script execution patterns.
Affected Countries
Germany, France, United Kingdom, Netherlands, Poland, Italy, Spain, Sweden
CVE-2022-24708: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in anuko timetracker
Description
Anuko Time Tracker is an open source, web-based time tracking application written in PHP. ttUser.class.php in Time Tracker versions prior to 1.20.0.5646 was not escaping primary group name for display. Because of that, it was possible for a logged in user to modify primary group name with elements of JavaScript. Such script could then be executed in user browser on subsequent requests on pages where primary group name was displayed. This is vulnerability has been fixed in version 1.20.0.5646. Users who are unable to upgrade may modify ttUser.class.php to use an additional call to htmlspecialchars when printing group name.
AI-Powered Analysis
Technical Analysis
CVE-2022-24708 is a medium-severity cross-site scripting (XSS) vulnerability affecting Anuko Time Tracker, an open-source, PHP-based web application used for time tracking. The vulnerability exists in versions prior to 1.20.0.5646 within the ttUser.class.php file, specifically in the handling of the primary group name attribute. The application failed to properly escape the primary group name before rendering it on web pages. This improper neutralization of input (CWE-79) allows a logged-in user to inject malicious JavaScript code into the primary group name field. When other users or the same user subsequently view pages displaying this group name, the injected script executes in their browsers. This can lead to session hijacking, credential theft, or other malicious actions performed in the context of the victim’s browser session. The vulnerability requires the attacker to have authenticated access to modify the primary group name, limiting exploitation to users with at least some level of access. No known public exploits have been reported in the wild. The issue was fixed in version 1.20.0.5646 by adding proper escaping using htmlspecialchars when outputting the group name. For users unable to upgrade, a manual patch involving the addition of htmlspecialchars calls in ttUser.class.php is recommended to mitigate the risk.
Potential Impact
For European organizations using Anuko Time Tracker versions prior to 1.20.0.5646, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and data. Since exploitation requires authenticated access, the threat is limited to insider threats or compromised user accounts. However, successful exploitation could allow attackers to execute arbitrary scripts in the context of other users’ browsers, potentially leading to session hijacking, unauthorized actions, or data leakage. This could disrupt business operations, especially in organizations relying on accurate time tracking for billing, payroll, or project management. The impact on availability is minimal, as the vulnerability does not directly enable denial-of-service conditions. Given the open-source nature of the product and its niche use, the overall risk is moderate but should not be underestimated in environments where sensitive time tracking data is critical.
Mitigation Recommendations
1. Upgrade Anuko Time Tracker to version 1.20.0.5646 or later, which contains the official fix for this vulnerability. 2. If upgrading is not immediately feasible, apply a manual patch by modifying ttUser.class.php to ensure the primary group name is escaped using PHP’s htmlspecialchars function before output. 3. Implement strict access controls and monitor user permissions to limit who can modify group names, reducing the risk of malicious input. 4. Conduct regular code reviews and security testing focusing on input validation and output encoding to prevent similar XSS issues. 5. Educate users about phishing and social engineering risks, as attackers may attempt to leverage this vulnerability in conjunction with other tactics. 6. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers, mitigating the impact of potential XSS payloads. 7. Monitor web application logs for unusual activity related to group name changes or unexpected script execution patterns.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-02-10T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf261a
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 3:48:07 PM
Last updated: 2/7/2026, 8:25:46 AM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2078: Improper Authorization in yeqifu warehouse
MediumCVE-2026-25533: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in agentfront enclave
MediumCVE-2026-25123: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr
MediumCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighCVE-2026-2074: XML External Entity Reference in O2OA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.