Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24036: CWE-284: Improper Access Control in horilla-opensource horilla

0
Medium
VulnerabilityCVE-2026-24036cvecve-2026-24036cwe-284
Published: Thu Jan 22 2026 (01/22/2026, 03:21:32 UTC)
Source: CVE Database V5
Vendor/Project: horilla-opensource
Product: horilla

Description

CVE-2026-24036 is a medium severity improper access control vulnerability in Horilla, an open-source Human Resource Management System. Versions 1. 4. 0 through 1. 4. x expose unpublished job postings via an unauthenticated endpoint, leaking draft job titles, descriptions, and application links. This unauthorized access can reveal sensitive internal hiring information and disrupt recruitment processes. The vulnerability does not allow modification of data or system compromise but poses confidentiality risks. It has been fixed in version 1. 5.

AI-Powered Analysis

AILast updated: 01/29/2026, 08:55:20 UTC

Technical Analysis

CVE-2026-24036 is an improper access control vulnerability (CWE-284) identified in Horilla, a free and open-source Human Resource Management System (HRMS). Specifically, versions 1.4.0 and above up to but not including 1.5.0 expose unpublished job postings through the /recruitment/recruitment-details// endpoint without requiring any authentication. This endpoint returns sensitive information such as draft job titles, descriptions, and application links for unpublished roles. Because the endpoint is accessible over the network without credentials or user interaction, any unauthenticated attacker can retrieve internal hiring data that is meant to remain confidential until officially published. The exposure of draft job postings can lead to leakage of strategic hiring plans, internal recruitment workflows, and potentially sensitive organizational information. Although the vulnerability does not allow attackers to modify data or disrupt system availability, the confidentiality impact is significant. The issue was addressed and fixed in Horilla version 1.5.0. There are no known exploits in the wild at the time of publication, but the low complexity of exploitation and lack of authentication requirements make this a notable risk for organizations using affected versions. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges required, no user interaction, and limited confidentiality impact.

Potential Impact

For European organizations, the unauthorized disclosure of unpublished job postings can have several impacts. Confidentiality of internal hiring strategies and workforce planning may be compromised, potentially revealing sensitive business information to competitors or malicious actors. This could lead to reputational damage if candidates or the public become aware of internal drafts prematurely, causing confusion and undermining trust in the recruitment process. While the vulnerability does not directly affect system integrity or availability, the leakage of internal HR data could be leveraged in social engineering or targeted attacks against employees or the organization. Organizations in highly regulated sectors or those with strict data privacy requirements may face compliance risks if sensitive personnel information is exposed. The ease of exploitation without authentication increases the risk profile, especially for organizations that have not updated to the patched version. The impact is primarily on confidentiality and organizational trust rather than operational disruption.

Mitigation Recommendations

European organizations using Horilla versions 1.4.0 through 1.4.x should prioritize upgrading to version 1.5.0 or later, where the vulnerability is fixed. If immediate upgrading is not feasible, organizations should implement network-level access controls to restrict access to the /recruitment/recruitment-details// endpoint, such as IP whitelisting or VPN-only access. Additionally, web application firewalls (WAFs) can be configured to detect and block unauthorized requests targeting this endpoint. Organizations should audit their current HRMS deployment to identify any exposure of unpublished job postings and review logs for any suspicious access patterns. Internal policies should be updated to ensure that sensitive recruitment data is not exposed via public or unauthenticated interfaces. Finally, organizations should monitor vendor advisories and community forums for any emerging exploit reports and apply security patches promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-20T22:30:11.776Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6971a2234623b1157c33646b

Added to database: 1/22/2026, 4:05:55 AM

Last enriched: 1/29/2026, 8:55:20 AM

Last updated: 2/6/2026, 2:12:45 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats