Home

Description

Kimai is an open-source time tracking application. In versions 1.16.3 through 2.52.0, the escapeForHtml() function in KimaiEscape.js does not escape double quote or single quote characters. When a user's profile alias is inserted into an HTML attribute context via the team member form prototype and rendered through innerHTML, this incomplete escaping allows HTML attribute injection. An authenticated user with ROLE_USER privileges can store a malicious alias that executes JavaScript in the browser of any administrator viewing the team form, resulting in stored XSS with privilege escalation. This issue has been fixed in version 2.53.0.

PUBLISHED Reserved 2026-04-13 | Published 2026-04-17 | Updated 2026-04-17 | Assigner GitHub_M




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

>= 1.16.3, < 2.53.0
affected

References

github.com/.../kimai/security/advisories/GHSA-g82g-m9vx-vhjg

github.com/kimai/kimai/releases/tag/2.53.0

cve.org (CVE-2026-40479)

nvd.nist.gov (CVE-2026-40479)

Download JSON