Kimai is a web-based multi-user time-tracking application. Prior to version 2.51.0, "GET /api/invoices/{id}" only checks the role-based view_invoice permission but does not verify the requesting user has access to the invoice's customer. Any user with ROLE_TEAMLEAD (which grants view_invoice) can read all invoices in the system, including those belonging to customers assigned to other teams. This issue has been patched in version 2.51.0.
References
| Link | Resource |
|---|---|
| https://github.com/kimai/kimai/commit/a0601c8cb28fed1cca19051a8272425069ab758f | Patch |
| https://github.com/kimai/kimai/releases/tag/2.51.0 | Product Release Notes |
| https://github.com/kimai/kimai/security/advisories/GHSA-v33r-r6h2-8wr7 | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-06 05:16
Updated : 2026-03-10 19:52
NVD link : CVE-2026-28685
Mitre link : CVE-2026-28685
CVE.ORG link : CVE-2026-28685
JSON object : View
Products Affected
kimai
- kimai
CWE
CWE-285
Improper Authorization
