Home

Description

Kimai is a web-based multi-user time-tracking application. Prior to version 2.46.0, Kimai's export functionality uses a Twig sandbox with an overly permissive security policy (`DefaultPolicy`) that allows arbitrary method calls on objects available in the template context. An authenticated user with export permissions can deploy a malicious Twig template that extracts sensitive information including environment variables, all user password hashes, serialized session tokens, and CSRF tokens. Version 2.46.0 patches this issue.

PUBLISHED Reserved 2026-01-14 | Published 2026-01-18 | Updated 2026-01-20 | Assigner GitHub_M




MEDIUM: 6.8CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine

Product status

< 2.46.0
affected

References

github.com/.../kimai/security/advisories/GHSA-jg2j-2w24-54cg

github.com/kimai/kimai/pull/5757

github.com/...ommit/6a86afb5fd79f6c1825060b87c09bd1909c2e86f

github.com/kimai/kimai/releases/tag/2.46.0

cve.org (CVE-2026-23626)

nvd.nist.gov (CVE-2026-23626)

Download JSON