Vulnerability Description
Kimai is a web-based multi-user time-tracking application. Prior to version 2.51.0, "GET /api/invoices/{id}" only checks the role-based view_invoice permission but does not verify the requesting user has access to the invoice's customer. Any user with ROLE_TEAMLEAD (which grants view_invoice) can read all invoices in the system, including those belonging to customers assigned to other teams. This issue has been patched in version 2.51.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kimai | Kimai | < 2.51.0 |
Related Weaknesses (CWE)
References
- https://github.com/kimai/kimai/commit/a0601c8cb28fed1cca19051a8272425069ab758fPatch
- https://github.com/kimai/kimai/releases/tag/2.51.0ProductRelease Notes
- https://github.com/kimai/kimai/security/advisories/GHSA-v33r-r6h2-8wr7ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-28685?
CVE-2026-28685 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Kimai is a web-based multi-user time-tracking application. Prior to version 2.51.0, "GET /api/invoices/{id}" only checks the role-based view_invoice permission but does not verify the requesting user ...
How severe is CVE-2026-28685?
CVE-2026-28685 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-28685?
Check the references section above for vendor advisories and patch information. Affected products include: Kimai Kimai.