Home

Description

Titra is open source project time tracking software. In versions 0.99.49 and below, an API has a Mass Assignment vulnerability which allows authenticated users to inject arbitrary fields into time entries, bypassing business logic controls via the customfields parameter. The affected endpoint uses the JavaScript spread operator (...customfields) to merge user-controlled input directly into the database document. While customfields is validated as an Object type, there is no validation of which keys are permitted inside that object. This allows attackers to overwrite protected fields such as userId, hours, and state. The issue is fixed in version 0.99.50.

PUBLISHED Reserved 2026-01-02 | Published 2026-01-07 | Updated 2026-01-08 | Assigner GitHub_M




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes

Product status

< 0.99.50
affected

References

github.com/.../titra/security/advisories/GHSA-gc65-vr47-jppq exploit

github.com/.../titra/security/advisories/GHSA-gc65-vr47-jppq

github.com/...ommit/29e6b88eca005107729e45a6f1731cf0fa5f8938

cve.org (CVE-2026-21695)

nvd.nist.gov (CVE-2026-21695)

Download JSON