Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3xc2-h5r3-wv3r | Kimai vulnerable to formula Injection via tag names in XLSX export |
Wed, 13 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:kimai:kimai:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 08 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kimai
Kimai kimai |
|
| Vendors & Products |
Kimai
Kimai kimai |
Fri, 08 May 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kimai is an open-source time tracking application. From version 2.27.0 to before version 2.54.0, any ROLE_USER can create a tag with a formula string as its name (e.g. =SUM(54+51)) via POST /api/tags and assign it to a timesheet. When an admin exports timesheets to XLSX, ArrayFormatter.formatValue() joins tag names with implode() and returns the result unchanged. OpenSpout promotes any =-prefixed string to a FormulaCell, writing <f>SUM(54+51)</f> into the XLSX archive. Excel evaluates the formula when the file is opened. This issue has been patched in version 2.54.0. | |
| Title | Kimai: Formula Injection via tag names in XLSX export | |
| Weaknesses | CWE-1236 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T12:58:12.770Z
Reserved: 2026-04-26T11:53:27.706Z
Link: CVE-2026-42267
Updated: 2026-05-08T12:58:07.671Z
Status : Analyzed
Published: 2026-05-08T04:16:20.533
Modified: 2026-05-13T17:58:49.080
Link: CVE-2026-42267
No data.
OpenCVE Enrichment
Updated: 2026-05-08T05:30:46Z
Github GHSA