Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jg2j-2w24-54cg | Kimai has an Authenticated Server-Side Template Injection (SSTI) |
Wed, 18 Feb 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:kimai:kimai:*:*:*:*:*:*:*:* |
Tue, 20 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 19 Jan 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kimai
Kimai kimai |
|
| Vendors & Products |
Kimai
Kimai kimai |
Sun, 18 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kimai is a web-based multi-user time-tracking application. Prior to version 2.46.0, Kimai's export functionality uses a Twig sandbox with an overly permissive security policy (`DefaultPolicy`) that allows arbitrary method calls on objects available in the template context. An authenticated user with export permissions can deploy a malicious Twig template that extracts sensitive information including environment variables, all user password hashes, serialized session tokens, and CSRF tokens. Version 2.46.0 patches this issue. | |
| Title | Kimai Vulnerable to Authenticated Server-Side Template Injection (SSTI) | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-20T20:07:08.477Z
Reserved: 2026-01-14T16:08:37.482Z
Link: CVE-2026-23626
Updated: 2026-01-20T19:37:31.497Z
Status : Analyzed
Published: 2026-01-18T23:15:48.393
Modified: 2026-02-18T16:30:19.177
Link: CVE-2026-23626
No data.
OpenCVE Enrichment
Updated: 2026-04-18T05:30:25Z
Github GHSA