SQL injection in time@work from systems@work

Posted date 13/02/2026
Identificador
INCIBE-2026-113
Importance
4 - High
Affected Resources

time@work, version 7.0.5.

Description

INCIBE has coordinated the publication of a high-severity vulnerability affecting time@work from systems@work, a program for allocating hours worked on projects. The vulnerability was discovered by Enrique Fernández Lorenzo (Bighound).

This vulnerability has been assigned the following code, CVSS v4.0 base score, CVSS vector, and CWE vulnerability type:

  • CVE-2025-59920: CVSS v4.0: 8.6 | CVSS AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N | CWE-89
Solution

The vulnerability has been fixed by the systems@work team in version 8.0.4.

Detail

CVE-2025-59920: When hours are entered in time@work, version 7.0.5, it performs a query to display the projects assigned to the user. If the query URL is copied and opened in a new browser window, the ‘IDClient’ parameter is vulnerable to a blind authenticated SQL injection. If the request is made with the TWAdmin user with the sysadmin role enabled, exploiting the vulnerability will allow commands to be executed on the system; if the user does not belong to the sysadmin role, they will still be able to query data from the database.

CVE
Identificador CVE Severidad Explotación Fabricante
CVE-2025-59920 Alta No systems@work
References list
Etiquetas