An unauthenticated attacker can inject OS commands when calling a server API endpoint in NesterSoft WorkTime. The server API call to generate and download the WorkTime client from the WorkTime server is vulnerable in the “guid” parameter. This allows an attacker to execute arbitrary commands on the WorkTime server as NT Authority\SYSTEM with the highest privileges. Attackers are able to access or manipulate sensitive data and take over the whole server.
References
| Link | Resource |
|---|---|
| https://r.sec-consult.com/worktime | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-19 11:15
Updated : 2026-03-03 16:39
NVD link : CVE-2025-15559
Mitre link : CVE-2025-15559
CVE.ORG link : CVE-2025-15559
JSON object : View
Products Affected
nestersoft
- worktime
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
