CVE-2023-32066

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-32066
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32066.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-32066
Aliases
  • GHSA-jw2g-8wvp-9frw
Published
2023-05-09T15:28:50.596Z
Modified
2025-12-04T23:50:39.963228Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Time Tracker has Stored XSS vulnerability in Week View plugin
Details

Time Tracker is an open source time tracking system. The week view plugin in Time Tracker versions 1.22.11.5782 and prior was not escaping titles for notes in week view table. Because of that, it was possible for a logged in user to enter notes with elements of JavaScript. Such script could then be executed in user browser on subsequent requests to week view. This issue is fixed in version 1.22.12.5783. As a workaround, use htmlspecialchars when calling $field->setTitle on line #245 in the week.php file, as happens in version 1.22.12.5783.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/32xxx/CVE-2023-32066.json"
}
References

Affected packages

Git / github.com/anuko/timetracker

Affected ranges

Type
GIT
Repo
https://github.com/anuko/timetracker
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed