Vulnerability Description
Kimai is an open-source time tracking application. From version 2.27.0 to before version 2.54.0, any ROLE_USER can create a tag with a formula string as its name (e.g. =SUM(54+51)) via POST /api/tags and assign it to a timesheet. When an admin exports timesheets to XLSX, ArrayFormatter.formatValue() joins tag names with implode() and returns the result unchanged. OpenSpout promotes any =-prefixed string to a FormulaCell, writing <f>SUM(54+51)</f> into the XLSX archive. Excel evaluates the formula when the file is opened. This issue has been patched in version 2.54.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kimai | Kimai | >= 2.27.0, < 2.54.0 |
Related Weaknesses (CWE)
References
- https://github.com/kimai/kimai/releases/tag/2.54.0ProductRelease Notes
- https://github.com/kimai/kimai/security/advisories/GHSA-3xc2-h5r3-wv3rExploitMitigationVendor Advisory
- https://github.com/kimai/kimai/security/advisories/GHSA-3xc2-h5r3-wv3rExploitMitigationVendor Advisory
FAQ
What is CVE-2026-42267?
CVE-2026-42267 is a vulnerability with a CVSS score of 5.7 (MEDIUM). Kimai is an open-source time tracking application. From version 2.27.0 to before version 2.54.0, any ROLE_USER can create a tag with a formula string as its name (e.g. =SUM(54+51)) via POST /api/tags ...
How severe is CVE-2026-42267?
CVE-2026-42267 has been rated MEDIUM with a CVSS base score of 5.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-42267?
Check the references section above for vendor advisories and patch information. Affected products include: Kimai Kimai.