Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15559: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NesterSoft Inc. WorkTime (on-prem/cloud)

0
Unknown
VulnerabilityCVE-2025-15559cvecve-2025-15559cwe-78
Published: Thu Feb 19 2026 (02/19/2026, 10:45:34 UTC)
Source: CVE Database V5
Vendor/Project: NesterSoft Inc.
Product: WorkTime (on-prem/cloud)

Description

An unauthenticated attacker can inject OS commands when calling a server API endpoint in NesterSoft WorkTime. The server API call to generate and download the WorkTime client from the WorkTime server is vulnerable in the “guid” parameter. This allows an attacker to execute arbitrary commands on the WorkTime server as NT Authority\SYSTEM with the highest privileges. Attackers are able to access or manipulate sensitive data and take over the whole server.

AI-Powered Analysis

AILast updated: 02/19/2026, 11:26:40 UTC

Technical Analysis

CVE-2025-15559 is an OS command injection vulnerability classified under CWE-78 affecting NesterSoft Inc.'s WorkTime product, versions up to and including 11.8.8, deployed both on-premises and in cloud environments. The vulnerability arises from improper neutralization of special elements in the 'guid' parameter of a server API endpoint responsible for generating and downloading the WorkTime client. Because the input is not sanitized correctly, an unauthenticated attacker can inject arbitrary OS commands. These commands are executed with the highest system privileges (NT Authority\SYSTEM), allowing complete control over the affected server. This includes the ability to access, modify, or delete sensitive data, disrupt services, or use the compromised server as a pivot point for further attacks. The attack vector requires no authentication or user interaction, increasing the risk of automated exploitation. Although no public exploits have been reported to date, the vulnerability's nature and privilege level make it a critical threat. The lack of a CVSS score indicates that the vulnerability is newly published and pending formal scoring, but the technical details clearly demonstrate a severe security risk. The vulnerability affects both cloud and on-premises deployments, broadening the scope of impact. Organizations relying on WorkTime for employee time tracking and management should prioritize assessment and remediation.

Potential Impact

For European organizations, the impact of CVE-2025-15559 is substantial. WorkTime is often used in sectors such as manufacturing, services, and government agencies for workforce management, meaning sensitive employee and operational data could be exposed or manipulated. The ability for an unauthenticated attacker to execute commands as SYSTEM can lead to full server compromise, data breaches, ransomware deployment, or disruption of business operations. Given the high privileges, attackers could also move laterally within networks, escalating the threat beyond the initial server. This could result in regulatory non-compliance issues under GDPR due to unauthorized access or data leakage. The vulnerability affects both cloud and on-premises deployments, so organizations with hybrid environments are equally at risk. The absence of known exploits currently provides a window for proactive defense, but the ease of exploitation and severity of impact necessitate urgent attention. The threat also poses risks to supply chain security if WorkTime servers are integrated with other critical infrastructure.

Mitigation Recommendations

Until official patches are released by NesterSoft Inc., European organizations should implement several specific mitigations: 1) Restrict network access to the vulnerable API endpoint by applying firewall rules or network segmentation to limit exposure to trusted IP addresses only. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'guid' parameter, focusing on command injection patterns. 3) Monitor server logs and network traffic for unusual API calls or command execution attempts, enabling rapid detection of exploitation attempts. 4) Disable or restrict the functionality that generates and downloads the WorkTime client if feasible, or require additional authentication layers around this API. 5) Conduct thorough audits of existing WorkTime deployments to identify affected versions and prioritize upgrades once patches are available. 6) Implement strict privilege separation and ensure that WorkTime servers run with the least privileges necessary to reduce potential damage. 7) Educate IT and security teams about this vulnerability to maintain heightened vigilance. 8) Prepare incident response plans specifically addressing potential exploitation scenarios of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2026-02-04T07:44:28.922Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6996efe46aea4a407a546d27

Added to database: 2/19/2026, 11:11:32 AM

Last enriched: 2/19/2026, 11:26:40 AM

Last updated: 2/21/2026, 12:20:18 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats