{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T21:25:03.434","vulnerabilities":[{"cve":{"id":"CVE-2026-23626","sourceIdentifier":"security-advisories@github.com","published":"2026-01-18T23:15:48.393","lastModified":"2026-02-18T16:30:19.177","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Kimai is a web-based multi-user time-tracking application. Prior to version 2.46.0, Kimai's export functionality uses a Twig sandbox with an overly permissive security policy (`DefaultPolicy`) that allows arbitrary method calls on objects available in the template context. An authenticated user with export permissions can deploy a malicious Twig template that extracts sensitive information including environment variables, all user password hashes, serialized session tokens, and CSRF tokens. Version 2.46.0 patches this issue."},{"lang":"es","value":"Kimai es una aplicación de seguimiento de tiempo multiusuario basada en web. Antes de la versión 2.46.0, la funcionalidad de exportación de Kimai utiliza un Twig sandbox con una política de seguridad excesivamente permisiva ('DefaultPolicy') que permite llamadas a métodos arbitrarias en objetos disponibles en el contexto de la plantilla. Un usuario autenticado con permisos de exportación puede desplegar una plantilla Twig maliciosa que extrae información sensible, incluyendo variables de entorno, todos los hashes de contraseña de usuario, tokens de sesión serializados y tokens CSRF. La versión 2.46.0 corrige este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":4.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-1336"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kimai:kimai:*:*:*:*:*:*:*:*","versionEndExcluding":"2.46.0","matchCriteriaId":"47DBF927-9B2F-4E84-9D11-0BB8793F2015"}]}]}],"references":[{"url":"https://github.com/kimai/kimai/commit/6a86afb5fd79f6c1825060b87c09bd1909c2e86f","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/kimai/kimai/pull/5757","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/kimai/kimai/releases/tag/2.46.0","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/kimai/kimai/security/advisories/GHSA-jg2j-2w24-54cg","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Vendor Advisory"]}]}}]}