Home

Description

PHP Timeclock 1.04 contains time-based and boolean-based blind SQL injection vulnerabilities in the login_userid parameter of login.php that allows unauthenticated attackers to extract database contents. Attackers can submit crafted POST requests with SQL payloads using SLEEP functions or RLIKE conditional statements to dump sensitive database information including employee names and credentials.

PUBLISHED Reserved 2026-05-15 | Published 2026-05-15 | Updated 2026-05-15 | Assigner VulnCheck




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

1.04
affected

Credits

Tyler Butler finder

References

www.exploit-db.com/exploits/49849 (ExploitDB-49849) exploit

timeclock.sourceforge.net (Official Product Homepage) product

sourceforge.net/...k/files/PHP Timeclock/PHP Timeclock 1.04/ (Product Reference) product

www.vulncheck.com/...p-timeclock-sql-injection-via-login-php (VulnCheck Advisory: PHP Timeclock 1.04 SQL Injection via login.php) third-party-advisory

cve.org (CVE-2021-47966)

nvd.nist.gov (CVE-2021-47966)

Download JSON