Description
Worklenz is a project management tool. Prior to 2.1.7, there are multiple SQL injection vulnerabilities were discovered in backend SQL query construction affecting project and task management controllers, reporting and financial data endpoints, real-time socket.io handlers, and resource allocation and scheduling features. The vulnerability has been patched in version v2.1.7.
Published: 2026-02-10
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Confidentiality Compromise
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a Boolean‑based blind SQL injection that arises from the application’s failure to properly validate input used in ORDER BY clauses. This flaw allows an attacker to craft queries that return true or false responses, enabling iterative enumeration of database contents and the potential alteration of sensitive data. The injection is not limited to a single endpoint; it spans project and task management, reporting and financial data, socket.io handlers, and resource allocation features. The impact is significant because it can reveal confidential project information, financial records, and real‑time operational data to an adversary.

Affected Systems

All installations of Worklenz prior to version 2.1.7 are affected. The issue was present in the client’s backend handling of project and task management controllers, reporting and financial data endpoints, real‑time socket.io handlers, and resource allocation and scheduling features. The vendor released a fix in Worklenz v2.1.7, which addresses all identified injection vectors.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity. The EPSS score is below 1 %, signifying a low likelihood of exploitation in the wild, though the vulnerability remains publicly documented and not listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote via a web interface that accepts ORDER BY parameters. Exploitation would allow attackers to extract or modify data stored in the Worklenz database, potentially leading to a breach of confidentiality, integrity, or availability of project information.

Generated by OpenCVE AI on April 17, 2026 at 20:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Worklenz to version 2.1.7 or later to apply the vendor patch.
  • If an upgrade cannot be performed immediately, deploy a web application firewall rule that blocks suspicious ORDER BY syntax or keywords associated with SQL injection.
  • Ensure that the database account used by Worklenz has the minimal required privileges, limiting it to read‑only operations wherever possible to reduce the impact of any remaining injection vectors.

Generated by OpenCVE AI on April 17, 2026 at 20:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:worklenz:worklenz:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Worklenz
Worklenz worklenz
Vendors & Products Worklenz
Worklenz worklenz

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
Description Worklenz is a project management tool. Prior to 2.1.7, there are multiple SQL injection vulnerabilities were discovered in backend SQL query construction affecting project and task management controllers, reporting and financial data endpoints, real-time socket.io handlers, and resource allocation and scheduling features. The vulnerability has been patched in version v2.1.7.
Title Worklenz Boolean-Based Blind SQL Injection via Improper ORDER BY Clause Input Validation
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Worklenz Worklenz
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-10T19:26:19.859Z

Reserved: 2026-02-09T17:13:54.064Z

Link: CVE-2026-25947

cve-icon Vulnrichment

Updated: 2026-02-10T19:25:45.460Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T18:16:38.423

Modified: 2026-02-23T17:57:18.470

Link: CVE-2026-25947

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:45:25Z

Weaknesses