Description
Titra is open source project time tracking software. In versions 0.99.49 and below, an API has a Mass Assignment vulnerability which allows authenticated users to inject arbitrary fields into time entries, bypassing business logic controls via the customfields parameter. The affected endpoint uses the JavaScript spread operator (...customfields) to merge user-controlled input directly into the database document. While customfields is validated as an Object type, there is no validation of which keys are permitted inside that object. This allows attackers to overwrite protected fields such as userId, hours, and state. The issue is fixed in version 0.99.50.
References
https://github.com/kromitgmbh/titra/security/advisories/GHSA-gc65-vr47-jppq
https://github.com/kromitgmbh/titra/security/advisories/GHSA-gc65-vr47-jppq
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 · Medium
Information
Source identifier
Vulnerability status
Analyzed
Published
2026-01-08T00:15:59.833Z
5 days agoLast modified
2026-01-12T18:40:56.820Z
6 hours ago