Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24038: CWE-287: Improper Authentication in horilla-opensource horilla

0
High
VulnerabilityCVE-2026-24038cvecve-2026-24038cwe-287
Published: Thu Jan 22 2026 (01/22/2026, 03:39:06 UTC)
Source: CVE Database V5
Vendor/Project: horilla-opensource
Product: horilla

Description

CVE-2026-24038 is a high-severity improper authentication vulnerability in Horilla HRMS versions 1. 4. 0 up to but not including 1. 5. 0. The flaw lies in the OTP verification logic where an expired OTP returns None, and if an attacker omits the OTP field in a POST request, the comparison passes, allowing bypass of two-factor authentication. This enables attackers to access accounts without valid OTPs, potentially compromising administrative accounts and sensitive HR data. The vulnerability does not require user interaction and can be exploited remotely with low complexity. Although no known exploits are reported in the wild, the impact on confidentiality and integrity is high. The issue is fixed in version 1.

AI-Powered Analysis

AILast updated: 01/22/2026, 04:20:35 UTC

Technical Analysis

CVE-2026-24038 affects Horilla, an open-source Human Resource Management System, specifically versions from 1.4.0 up to but not including 1.5.0. The vulnerability arises from improper authentication due to flawed OTP handling logic. When an OTP expires, the server returns a None value. If an attacker crafts a POST request omitting the OTP field, the user-supplied OTP is also interpreted as None. The equality check comparing user_otp == otp thus evaluates to true, bypassing the two-factor authentication mechanism entirely. This bypass allows attackers to authenticate without providing a valid OTP, effectively negating the second factor of authentication. The vulnerability is particularly critical when targeting administrative accounts, as it can lead to unauthorized access to sensitive HR data, manipulation of employee records, and potential lateral movement within the system. The CVSS 3.1 base score is 8.1, reflecting high severity due to network attack vector, low attack complexity, and no user interaction required. The vulnerability does not affect availability but severely impacts confidentiality and integrity. No known exploits have been reported in the wild as of the publication date. The issue was resolved in Horilla version 1.5.0 by correcting the OTP comparison logic to properly handle expired OTPs and prevent bypass. Organizations running affected versions should prioritize upgrading to mitigate risk.

Potential Impact

For European organizations, the impact of this vulnerability is significant. HRMS platforms like Horilla often store highly sensitive personal data, including employee identities, payroll information, and performance records. Unauthorized access through this vulnerability could lead to data breaches violating GDPR and other privacy regulations, resulting in legal penalties and reputational damage. Attackers gaining administrative access could manipulate employee records, disrupt HR operations, or use the compromised system as a foothold for broader network intrusion. The lack of requirement for user interaction and the ability to exploit remotely increase the risk of widespread exploitation. Organizations in sectors with stringent compliance requirements, such as finance, healthcare, and government, face heightened consequences. The vulnerability undermines trust in multi-factor authentication, a critical security control, potentially exposing organizations to further attacks if not remediated promptly.

Mitigation Recommendations

Immediate upgrade to Horilla version 1.5.0 or later is the primary mitigation step to address the OTP bypass vulnerability. Organizations should audit authentication logs for suspicious login attempts where the OTP field was missing or null. Implement additional monitoring and alerting on administrative account access patterns. Where possible, enforce IP whitelisting or VPN access for administrative interfaces to reduce exposure. Consider integrating external multi-factor authentication solutions that do not rely solely on the vulnerable OTP logic. Conduct a thorough review of user privileges and remove unnecessary administrative rights. Educate HR and IT staff about the vulnerability and the importance of timely patching. If upgrading is temporarily not feasible, implement compensating controls such as network segmentation and enhanced anomaly detection to limit potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-20T22:30:11.777Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6971a2234623b1157c336474

Added to database: 1/22/2026, 4:05:55 AM

Last enriched: 1/22/2026, 4:20:35 AM

Last updated: 1/22/2026, 6:19:17 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats