Horilla HRMS EUVD-2026-24231

| CVE-2026-40865 HIGH
Improper Access Control (CWE-284)
2026-04-21 GitHub_M
7.1
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
X

Lifecycle Timeline

3
Re-analysis Queued
Apr 22, 2026 - 21:07 vuln.today
cvss_changed
Analysis Generated
Apr 21, 2026 - 19:47 vuln.today
CVSS changed
Apr 21, 2026 - 19:22 NVD
7.1 (HIGH)

DescriptionNVD

Horilla is a free and open source Human Resource Management System (HRMS). In 1.5.0, an insecure direct object reference in the employee document viewer allows any authenticated user to access other employees’ uploaded documents by changing the document ID in the request. This exposes sensitive HR files such as identity documents, contracts, certificates, and other private employee records.

AnalysisAI

Insecure direct object reference in Horilla HRMS 1.5.0 employee document viewer allows authenticated users to access other employees' sensitive HR files by manipulating document IDs in API requests. Successful exploitation exposes identity documents, employment contracts, certificates, and other confidential employee records. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Audit API access logs for document ID manipulation patterns and identify affected employees. Notify your Horilla vendor contact to confirm patch timeline for version 1.5.0 and request interim security guidance. …

Sign in for detailed remediation steps.

Share

EUVD-2026-24231 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy