PHP Timeclock 1.04 contains time-based and boolean-based...
High severity
Unreviewed
Published
May 15, 2026
to the GitHub Advisory Database
•
Updated May 15, 2026
Description
Published by the National Vulnerability Database
May 15, 2026
Published to the GitHub Advisory Database
May 15, 2026
Last updated
May 15, 2026
PHP Timeclock 1.04 contains time-based and boolean-based blind SQL injection vulnerabilities in the login_userid parameter of login.php that allows unauthenticated attackers to extract database contents. Attackers can submit crafted POST requests with SQL payloads using SLEEP functions or RLIKE conditional statements to dump sensitive database information including employee names and credentials.
References