Security Advisory: CVE-2025-57681 - Stored XSS in WorklogPRO DC
This advisory documents a Stored Cross-Site Scripting (XSS) vulnerability discovered in the WorklogPRO - Jira Timesheets app.
1. Vulnerability Overview
CVE ID: CVE-2025-57681
Product: WorklogPRO - Jira Timesheets
Vendor: The Starware
Vulnerability Type: Cross-Site Scripting (XSS) - Stored
2. Affected and Fixed Versions
Affected Versions: All versions before 4.23.7
Fixed Version: 4.23.7
3. Technical Description
The WorklogPRO - Jira Timesheets plugin in Jira Data Center before version 4.23.7 allows users and attackers to inject arbitrary HTML or JavaScript via a Stored Cross-Site Scripting (XSS) vulnerability.
The vulnerability is exploited via a specially crafted payload placed in an issue's summary field. This code is executed in a user's browser when they attempt to add a worklog to that issue on the calendar page, as the summary field is not properly sanitized during the action.
4. Proof of Concept
The following steps demonstrate how to reproduce the vulnerability:
Injection: Create a new Jira issue or edit an existing one. In the Summary field, inject the following XSS payload:
<script>alert("CreateIssueSummary")</script>Navigation: Navigate to WorklogPRO → Worklog Calendar.
Trigger: Click on the "Log Work" button to open the dialog.
Execution: In the "Issue" dropdown, search for and select the issue created in Step 1.
Observation: The injected JavaScript executes immediately, displaying an alert box.
5. Mitigation / Solution
Users are advised to upgrade to version 4.23.7 or later, which addresses this issue. The vendor has released a fix under issue ID WLP-1581.
5. References
Vendor Release Notes: Release Notes 4.x
Vendor Issue Tracker: WLP-1581 fix: stored XSS Vulnerability In WorklogPRO DC
Official CVE Record: CVE-2025-57681
6. Credit
Discovered by “Ionut Luca from CybrOps”.