CVE-2025-59920: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in systems at work time at work
When hours are entered in time@work, version 7.0.5, it performs a query to display the projects assigned to the user. If the query URL is copied and opened in a new browser window, the ‘IDClient’ parameter is vulnerable to a blind authenticated SQL injection. If the request is made with the TWAdmin user with the sysadmin role enabled, exploiting the vulnerability will allow commands to be executed on the system; if the user does not belong to the sysadmin role, they will still be able to query data from the database.
AI Analysis
Technical Summary
CVE-2025-59920 is a critical SQL injection vulnerability identified in version 7.0.5 of the 'time at work' software by systems at work. The vulnerability arises from improper neutralization of special elements in the 'IDClient' parameter within a query that retrieves projects assigned to authenticated users. Specifically, the parameter is susceptible to blind SQL injection when the query URL is copied and opened in a new browser window. This flaw allows an authenticated attacker to inject malicious SQL commands. For users with standard privileges, exploitation enables unauthorized querying and extraction of sensitive database information. However, if the attacker has sysadmin privileges (e.g., the TWAdmin user), the vulnerability escalates to allow execution of arbitrary system commands on the host, potentially leading to full system compromise. The attack vector requires network access and authentication but no additional user interaction. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command) and has a CVSS 4.0 score of 8.6, indicating high severity due to its impact on confidentiality, integrity, and availability, combined with low attack complexity and no requirement for user interaction. No patches or public exploits are currently documented, but the risk remains significant due to the potential for privilege escalation and data exfiltration.
Potential Impact
For European organizations using 'time at work' version 7.0.5, this vulnerability poses a severe risk to data confidentiality and system integrity. Unauthorized database queries by authenticated users can lead to exposure of sensitive project and client data, potentially violating data protection regulations such as GDPR. If exploited by sysadmin-level users, attackers can execute arbitrary commands on the underlying system, risking full system compromise, data destruction, or lateral movement within the network. This can disrupt business operations, damage reputation, and incur regulatory penalties. The vulnerability's exploitation does not require user interaction, increasing the likelihood of automated or targeted attacks. Organizations in sectors with stringent compliance requirements or critical infrastructure relying on this software are particularly vulnerable. The lack of known public exploits currently limits immediate widespread exploitation but does not diminish the urgency for remediation.
Mitigation Recommendations
Immediate mitigation steps include upgrading to a patched version of 'time at work' once available from systems at work. In the absence of a patch, organizations should implement strict input validation and parameterized queries to sanitize the 'IDClient' parameter and prevent SQL injection. Restrict access to the application and database to only necessary users and roles, minimizing the number of sysadmin accounts. Employ network segmentation and monitoring to detect anomalous query patterns indicative of SQL injection attempts. Enforce strong authentication and session management to prevent credential compromise. Conduct regular security assessments and code reviews focusing on input handling. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to block suspicious SQL injection payloads targeting this parameter. Finally, maintain comprehensive logging and alerting to facilitate rapid incident response if exploitation is attempted.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium
CVE-2025-59920: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in systems at work time at work
Description
When hours are entered in time@work, version 7.0.5, it performs a query to display the projects assigned to the user. If the query URL is copied and opened in a new browser window, the ‘IDClient’ parameter is vulnerable to a blind authenticated SQL injection. If the request is made with the TWAdmin user with the sysadmin role enabled, exploiting the vulnerability will allow commands to be executed on the system; if the user does not belong to the sysadmin role, they will still be able to query data from the database.
AI-Powered Analysis
Technical Analysis
CVE-2025-59920 is a critical SQL injection vulnerability identified in version 7.0.5 of the 'time at work' software by systems at work. The vulnerability arises from improper neutralization of special elements in the 'IDClient' parameter within a query that retrieves projects assigned to authenticated users. Specifically, the parameter is susceptible to blind SQL injection when the query URL is copied and opened in a new browser window. This flaw allows an authenticated attacker to inject malicious SQL commands. For users with standard privileges, exploitation enables unauthorized querying and extraction of sensitive database information. However, if the attacker has sysadmin privileges (e.g., the TWAdmin user), the vulnerability escalates to allow execution of arbitrary system commands on the host, potentially leading to full system compromise. The attack vector requires network access and authentication but no additional user interaction. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command) and has a CVSS 4.0 score of 8.6, indicating high severity due to its impact on confidentiality, integrity, and availability, combined with low attack complexity and no requirement for user interaction. No patches or public exploits are currently documented, but the risk remains significant due to the potential for privilege escalation and data exfiltration.
Potential Impact
For European organizations using 'time at work' version 7.0.5, this vulnerability poses a severe risk to data confidentiality and system integrity. Unauthorized database queries by authenticated users can lead to exposure of sensitive project and client data, potentially violating data protection regulations such as GDPR. If exploited by sysadmin-level users, attackers can execute arbitrary commands on the underlying system, risking full system compromise, data destruction, or lateral movement within the network. This can disrupt business operations, damage reputation, and incur regulatory penalties. The vulnerability's exploitation does not require user interaction, increasing the likelihood of automated or targeted attacks. Organizations in sectors with stringent compliance requirements or critical infrastructure relying on this software are particularly vulnerable. The lack of known public exploits currently limits immediate widespread exploitation but does not diminish the urgency for remediation.
Mitigation Recommendations
Immediate mitigation steps include upgrading to a patched version of 'time at work' once available from systems at work. In the absence of a patch, organizations should implement strict input validation and parameterized queries to sanitize the 'IDClient' parameter and prevent SQL injection. Restrict access to the application and database to only necessary users and roles, minimizing the number of sysadmin accounts. Employ network segmentation and monitoring to detect anomalous query patterns indicative of SQL injection attempts. Enforce strong authentication and session management to prevent credential compromise. Conduct regular security assessments and code reviews focusing on input handling. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to block suspicious SQL injection payloads targeting this parameter. Finally, maintain comprehensive logging and alerting to facilitate rapid incident response if exploitation is attempted.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-09-23T10:24:23.469Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6995c8856aea4a407a9d0d0b
Added to database: 2/18/2026, 2:11:17 PM
Last enriched: 2/18/2026, 2:25:30 PM
Last updated: 2/21/2026, 12:19:30 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.