CVE-2025-15563

5.3 MEDIUM

📋 TL;DR

This vulnerability allows any unauthenticated user to reset the WorkTime on-prem database configuration by sending a specific HTTP request to the WorkTime server. This occurs because no authorization check is applied to the reset functionality. All WorkTime on-prem installations are affected.

💻 Affected Systems

Products:
  • WorkTime on-prem
Versions: All versions prior to patch
Operating Systems: All supported OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects on-prem installations; cloud versions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database configuration reset leading to service disruption, data corruption, or unauthorized access to sensitive database information.

🟠

Likely Case

Service disruption and potential data loss from database configuration being reset to defaults.

🟢

If Mitigated

Minimal impact if proper network segmentation and authentication controls prevent unauthorized access.

🌐 Internet-Facing: HIGH - Any internet-facing WorkTime server can be exploited by unauthenticated attackers.
🏢 Internal Only: HIGH - Even internally accessible servers are vulnerable to any network user.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request with no authentication required; trivial to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific version

Vendor Advisory: https://r.sec-consult.com/worktime

Restart Required: Yes

Instructions:

1. Download latest patch from vendor. 2. Apply patch according to vendor instructions. 3. Restart WorkTime service. 4. Verify fix.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to WorkTime server to authorized users only

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_IP" port protocol="tcp" port="WORKTIME_PORT" accept'
netsh advfirewall firewall add rule name="WorkTime Access" dir=in action=allow protocol=TCP localport=WORKTIME_PORT remoteip=TRUSTED_IP

Web Application Firewall

all

Block requests to database reset endpoint

WAF rule: Block requests containing '/database/reset' or similar reset patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WorkTime server from untrusted networks
  • Deploy web application firewall with rules to block database reset requests

🔍 How to Verify

Check if Vulnerable:

Send HTTP request to WorkTime server's database reset endpoint without authentication; if reset occurs, system is vulnerable.

Check Version:

Check WorkTime admin interface or consult vendor documentation for version check command

Verify Fix Applied:

Attempt same unauthenticated reset request; should receive authentication error or be blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated requests to database reset endpoints
  • Database configuration change logs without user authentication

Network Indicators:

  • HTTP requests to /database/reset or similar endpoints from unauthenticated sources

SIEM Query:

source="worktime" AND (uri="/database/reset" OR uri="*reset*") AND auth_status="unauthenticated"

🔗 References

📤 Share & Export