Description
An unauthenticated SQL injection vulnerability exists in Kimai version 0.9.2.x via the db_restore.php endpoint. The flaw allows attackers to inject arbitrary SQL queries into the dates[] POST parameter, enabling file write via INTO OUTFILE under specific environmental conditions. This can lead to remote code execution by writing a PHP payload to the web-accessible temporary directory. The vulnerability has been confirmed in versions including 0.9.2.beta, 0.9.2.1294.beta, and 0.9.2.1306-3.
Published: 2025-07-31
Score: 9.3 Critical
EPSS: 47.2% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2013-7255 An unauthenticated SQL injection vulnerability exists in Kimai version 0.9.2.x via the db_restore.php endpoint. The flaw allows attackers to inject arbitrary SQL queries into the dates[] POST parameter, enabling file write via INTO OUTFILE under specific environmental conditions. This can lead to remote code execution by writing a PHP payload to the web-accessible temporary directory. The vulnerability has been confirmed in versions including 0.9.2.beta, 0.9.2.1294.beta, and 0.9.2.1306-3.
History

Thu, 20 Nov 2025 23:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:kimai_project:kimai:0.9.2.*:*:*:*:*:*:*:*

Thu, 31 Jul 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Kimai
Kimai kimai
Kimai Project
Kimai Project kimai
Vendors & Products Kimai
Kimai kimai
Kimai Project
Kimai Project kimai

Thu, 31 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 31 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
Description An unauthenticated SQL injection vulnerability exists in Kimai version 0.9.2.x via the db_restore.php endpoint. The flaw allows attackers to inject arbitrary SQL queries into the dates[] POST parameter, enabling file write via INTO OUTFILE under specific environmental conditions. This can lead to remote code execution by writing a PHP payload to the web-accessible temporary directory. The vulnerability has been confirmed in versions including 0.9.2.beta, 0.9.2.1294.beta, and 0.9.2.1306-3.
Title Kimai 0.9.2 db_restore.php SQL Injection
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:02:56.764Z

Reserved: 2025-07-30T16:03:03.489Z

Link: CVE-2013-10033

cve-icon Vulnrichment

Updated: 2025-07-31T18:52:38.579Z

cve-icon NVD

Status : Deferred

Published: 2025-07-31T15:15:32.773

Modified: 2026-04-15T00:35:42.020

Link: CVE-2013-10033

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-31T20:20:37Z

Weaknesses