Home

Description

Value provided in one of POST parameters sent during the process of logging in to Times Software E-Payroll is not sanitized properly, which allows an unauthenticated attacker to perform DoS attacks. SQL injection attacks might also be feasible, although so far creating a working exploit has been prevented probably by backend filtering mechanisms. Additionally, command injection attempts cause the application to return extensive error messages disclosing some information about the internal infrastructure.  Patching status is unknown because the vendor has not replied to messages sent by the CNA.

PUBLISHED Reserved 2025-09-04 | Published 2025-11-18 | Updated 2025-11-18 | Assigner CERT-PL




MEDIUM: 5.3CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CWE-209 Generation of Error Message Containing Sensitive Information

Product status

Default status
unknown

Any version
affected

Credits

Sebastian Jeż finder

References

cert.pl/en/posts/2025/11/CVE-2025-9977 third-party-advisory

www.timesoftsg.com.sg/payroll-software/ product

cve.org (CVE-2025-9977)

nvd.nist.gov (CVE-2025-9977)

Download JSON