API password hash leakage via invoice Twig template

Affected versions

  • Affected versions: <= 2.52.0
  • Patched version: 2.53.0
  • Advisory published: 11 Apr 2026

Severity

Severity: Low

We have not requested an official CVE ID for this security advisory.

Vulnerability

Kimai allowed invoice Twig templates to access API token related user methods that should not have been exposed in the sandbox. In affected versions, a crafted invoice template could include the hashed API token of the user who generated the invoice in the rendered output.

Info

This issue was caused by an incomplete method blocklist in the Twig security policy.

  • Sensitive user methods such as password-related accessors were blocked, but API token methods were not
  • A malicious or careless invoice template could therefore access token-related data through the invoice model
  • The practical impact is limited because API passwords are deprecated and the leaked value is a hash, not a reusable plaintext token
  • Only a System-Admin (with the permission upload_invoice_template) could upload such crafted templates.
  • Kimai Cloud is not affected because Twig templates have to pass a manual review process

Solution

Users should update to 2.53.0 or newer.

Credits

  • Reported by: hett-patell
  • Patched by: kevinpapst

First reported in GitHub advisory: GHSA-rh42-6rj2-xwmc

Top