No advisories yet.
Solution
The vulnerability has been fixed by the systems@work team in version 8.0.4.
Workaround
No workaround given by the vendor.
Wed, 18 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When hours are entered in time@work, version 7.0.5, it performs a query to display the projects assigned to the user. If the query URL is copied and opened in a new browser window, the ‘IDClient’ parameter is vulnerable to a blind authenticated SQL injection. If the request is made with the TWAdmin user with the sysadmin role enabled, exploiting the vulnerability will allow commands to be executed on the system; if the user does not belong to the sysadmin role, they will still be able to query data from the database. | |
| Title | SQL injection in time@work from systems@work | |
| First Time appeared |
Systems At Work
Systems At Work time At Work |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:systems_at_work:time_at_work:7.0.5:*:*:*:*:*:*:* | |
| Vendors & Products |
Systems At Work
Systems At Work time At Work |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-02-18T14:06:31.380Z
Reserved: 2025-09-23T10:24:23.469Z
Link: CVE-2025-59920
Updated: 2026-02-18T14:06:22.589Z
Status : Received
Published: 2026-02-18T14:16:04.333
Modified: 2026-02-18T14:16:04.333
Link: CVE-2025-59920
No data.
OpenCVE Enrichment
No data.