Home

Description

solidtime is an open-source time-tracking app. In version 0.12.0, the PUT /api/v1/organizations/{organization}/time-entries/{timeEntry} API accepts a route-bound timeEntry from another organization when the caller has time-entries:update:all in the URL organization, allowing a known foreign time-entry UUID to be modified and rebound to objects in the caller's organization. This issue has been patched in version 0.12.1.

PUBLISHED Reserved 2026-04-26 | Published 2026-05-08 | Updated 2026-05-08 | Assigner GitHub_M




MEDIUM: 5.8CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

= 0.12.0
affected

References

github.com/...idtime/security/advisories/GHSA-pmf9-pxq9-ccwr exploit

github.com/...idtime/security/advisories/GHSA-pmf9-pxq9-ccwr

github.com/...ommit/b73aa543fdf5b61c37447307ab7277451296832c

github.com/solidtime-io/solidtime/releases/tag/v0.12.1

cve.org (CVE-2026-42279)

nvd.nist.gov (CVE-2026-42279)

Download JSON