The server API endpoint /report/internet/urls reflects received data into the HTML response without applying proper encoding or filtering. This allows an attacker to execute arbitrary JavaScript in the victim's browser if the victim opens a URL prepared by the attacker.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
The vendor did not respond to our communication attempts anymore. It is currently as of February 2026 unclear, whether a patch is available. Please contact the vendor to request a patch for the identified critical security issues.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://r.sec-consult.com/worktime |
|
History
Thu, 19 Feb 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The server API endpoint /report/internet/urls reflects received data into the HTML response without applying proper encoding or filtering. This allows an attacker to execute arbitrary JavaScript in the victim's browser if the victim opens a URL prepared by the attacker. | |
| Title | Reflected Cross-Site Scripting in NesterSoft WorkTime | |
| Weaknesses | CWE-79 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-02-19T10:54:52.516Z
Reserved: 2026-02-04T07:44:36.442Z
Link: CVE-2025-15562
No data.
No data.
No data.
OpenCVE Enrichment
No data.
Weaknesses