Description

Kimai is a web-based multi-user time-tracking application. Prior to version 2.51.0, "GET /api/invoices/{id}" only checks the role-based view_invoice permission but does not verify the requesting user has access to the invoice's customer. Any user with ROLE_TEAMLEAD (which grants view_invoice) can read all invoices in the system, including those belonging to customers assigned to other teams. This issue has been patched in version 2.51.0.

INFO

Published Date :

2026-03-06T04:49:08.312Z

Last Modified :

2026-03-09T19:46:54.339Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-28685 vulnerability.

Vendors Products
Kimai
  • Kimai

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact