CVE-2026-28685

medium

Description

Kimai is a web-based multi-user time-tracking application. Prior to version 2.51.0, "GET /api/invoices/{id}" only checks the role-based view_invoice permission but does not verify the requesting user has access to the invoice's customer. Any user with ROLE_TEAMLEAD (which grants view_invoice) can read all invoices in the system, including those belonging to customers assigned to other teams. This issue has been patched in version 2.51.0.

References

https://github.com/kimai/kimai/security/advisories/GHSA-v33r-r6h2-8wr7

https://github.com/kimai/kimai/releases/tag/2.51.0

https://github.com/kimai/kimai/commit/a0601c8cb28fed1cca19051a8272425069ab758f

Details

Source: Mitre, NVD

Published: 2026-03-06

Updated: 2026-03-06

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 6.5

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Severity: Medium

EPSS

EPSS: 0.00027