Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24039: CWE-284: Improper Access Control in horilla-opensource horilla

0
Medium
VulnerabilityCVE-2026-24039cvecve-2026-24039cwe-284
Published: Thu Jan 22 2026 (01/22/2026, 03:43:41 UTC)
Source: CVE Database V5
Vendor/Project: horilla-opensource
Product: horilla

Description

CVE-2026-24039 is an improper access control vulnerability in Horilla HRMS versions 1. 4. 0 up to but not including 1. 5. 0. It allows low-privileged employees to self-approve documents they have uploaded, bypassing intended restrictions that reserve approval actions for administrators or high-privilege roles. This flaw arises from insufficient server-side authorization checks on the document approval endpoint. Exploitation undermines the integrity of HR processes by enabling unvetted documents to be accepted, potentially impacting credential and certification validation. The vulnerability has a CVSS score of 4. 3 (medium severity) and does not require user interaction but does require low-level privileges.

AI-Powered Analysis

AILast updated: 01/22/2026, 04:20:55 UTC

Technical Analysis

Horilla is an open-source Human Resource Management System (HRMS) used to manage employee data and HR workflows. In versions 1.4.0 through 1.4.x, a critical flaw exists in the access control mechanism governing document approval. The document approval user interface is designed to be accessible only by administrators or users with elevated privileges. However, the server-side authorization logic on the approval endpoint fails to properly verify the user's role, allowing any authenticated employee to approve documents they have uploaded themselves. This improper access control (CWE-284) enables low-privileged users to alter application state reserved for administrators, effectively bypassing HR governance controls. The impact includes the potential acceptance of fraudulent or unverified documents such as credentials or certifications, which can compromise HR decision-making and compliance. The vulnerability does not affect confidentiality or availability but impacts integrity. Exploitation requires only low privileges and no user interaction, making it relatively easy to exploit within affected environments. The vulnerability was publicly disclosed on January 22, 2026, with no known exploits in the wild. The vendor addressed the issue in Horilla version 1.5.0 by implementing proper server-side authorization checks to restrict document approval actions to authorized roles only.

Potential Impact

For European organizations using Horilla HRMS versions 1.4.0 to 1.4.x, this vulnerability poses a significant risk to the integrity of HR processes. Attackers with employee-level access can self-approve documents, potentially allowing fraudulent credentials, certifications, or other critical HR documents to be accepted without proper vetting. This can lead to regulatory compliance issues, especially under strict European data protection and employment laws, and may result in hiring unqualified personnel or internal fraud. While confidentiality and availability are not directly impacted, the trustworthiness of HR data and workflows is compromised, which can have downstream effects on organizational security and compliance. The ease of exploitation and the lack of required user interaction increase the likelihood of abuse if the vulnerability is not patched. Organizations in sectors with stringent HR compliance requirements, such as finance, healthcare, and government, are particularly at risk.

Mitigation Recommendations

European organizations should immediately upgrade Horilla HRMS installations to version 1.5.0 or later, where the vulnerability is fixed. Until upgrades can be performed, organizations should implement compensating controls such as restricting access to the document approval UI and endpoints via network segmentation or web application firewalls (WAFs) that enforce role-based access controls. Conduct thorough audits of document approval logs to detect unauthorized approvals and implement enhanced monitoring for anomalous approval activities. Additionally, enforce strict internal policies requiring multi-person approval workflows for critical HR documents to reduce the risk of unilateral fraudulent approvals. Regularly review and update user roles and permissions to ensure least privilege principles are applied. Finally, educate HR and IT staff about the vulnerability and the importance of timely patching and monitoring.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-20T22:30:11.777Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6971a2234623b1157c336478

Added to database: 1/22/2026, 4:05:55 AM

Last enriched: 1/22/2026, 4:20:55 AM

Last updated: 1/22/2026, 6:19:26 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats