Description
Horilla is a free and open source Human Resource Management System (HRMS). In versions prior to 1.5.0, a cross-site scripting vulnerability can be triggered because the extension and content-type are not checked during the profile photo update step. Version 1.5.0 fixes the issue.
Published: 2026-01-22
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑site scripting via file upload
Action: Apply patch
AI Analysis

Impact

Horilla, an open‑source HRMS, allows users to update profile pictures without validating file extensions or MIME types in versions prior to 1.5.0. This allows an attacker to upload a script disguised as an image that is then served and executed in the browser when other users view the profile, giving the attacker code‑execution capabilities within victim sessions. The issue is classified as CWE‑434, reflecting an improper input validation weakness.

Affected Systems

Any installation of Horilla running a version earlier than 1.5.0 is vulnerable. The product is identified under horilla‑opensource:horilla, with no specific sub‑versions listed beyond the confirmed patch release at 1.5.0.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity, and the EPSS score of less than 1% coupled with no listing in the CISA KEV catalog suggests a low probability of widespread exploitation. Nevertheless, the vulnerability is easily exploitable once an attacker has the ability to upload a file; any user who views the affected profile could be impacted by the injected script.

Generated by OpenCVE AI on April 18, 2026 at 15:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Horilla 1.5.0 or later to obtain the vendor patch.
  • If an upgrade cannot be performed immediately, configure the upload handler to accept only trusted image file extensions (e.g., .jpg, .png, .gif) and verify the MIME type server‑side.
  • Serve uploaded images with a Content‑Disposition header set to attachment and proper Content‑Type headers to prevent the file from being executed as script content.

Generated by OpenCVE AI on April 18, 2026 at 15:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:horilla:horilla:*:*:*:*:*:*:*:*

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Horilla
Horilla horilla
Vendors & Products Horilla
Horilla horilla

Thu, 22 Jan 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 03:30:00 +0000

Type Values Removed Values Added
Description Horilla is a free and open source Human Resource Management System (HRMS). In versions prior to 1.5.0, a cross-site scripting vulnerability can be triggered because the extension and content-type are not checked during the profile photo update step. Version 1.5.0 fixes the issue.
Title Horilla has File Upload XSS
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-22T12:44:21.620Z

Reserved: 2026-01-20T22:30:11.776Z

Link: CVE-2026-24034

cve-icon Vulnrichment

Updated: 2026-01-22T12:44:18.088Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T04:15:59.303

Modified: 2026-01-29T19:03:50.480

Link: CVE-2026-24034

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:30:03Z

Weaknesses