{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T20:47:34.090","vulnerabilities":[{"cve":{"id":"CVE-2025-69288","sourceIdentifier":"security-advisories@github.com","published":"2025-12-31T22:15:49.410","lastModified":"2026-01-13T15:25:44.200","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Titra is open source project time tracking software. Prior to version 0.99.49, Titra allows any authenticated Admin user to modify the timeEntryRule in the database. The value is then passed to a NodeVM value to execute as code. Without sanitization, it leads to a Remote Code Execution. Version 0.99.49 fixes the issue."},{"lang":"es","value":"Titra es un software de seguimiento de tiempo de proyectos de código abierto. Antes de la versión 0.99.49, Titra permite a cualquier usuario administrador autenticado modificar la timeEntryRule en la base de datos. El valor es entonces pasado a un valor de NodeVM para ejecutarse como código. Sin sanitización, esto lleva a una Ejecución Remota de Código. La versión 0.99.49 corrige el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kromit:titra:*:*:*:*:*:*:*:*","versionEndExcluding":"0.99.49","matchCriteriaId":"37C388F6-B08A-47B0-A47E-F4543158100B"}]}]}],"references":[{"url":"https://github.com/kromitgmbh/titra/commit/2e2ac5cbeed47a76720b21c7fde0214a242e065e","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/kromitgmbh/titra/releases/tag/0.99.49","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/kromitgmbh/titra/security/advisories/GHSA-pqgx-6wg3-gmvr","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory","Mitigation"]},{"url":"https://github.com/kromitgmbh/titra/security/advisories/GHSA-pqgx-6wg3-gmvr","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory","Mitigation"]}]}}]}