Description
Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the has_xss() function attempts to block XSS by matching input against a set of regex patterns. However, the regexes are incomplete and context-agnostic, making them easy to bypass. Attackers are able to redirect users to malicious domains, run external JavaScript, and steal CSRF tokens that can be used to craft CSRF attacks against admins. This issue has been fixed in version 1.5.0.
Published: 2026-01-22
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑site scripting via project name bypass
Action: Patch
AI Analysis

Impact

The flaw originates from an incomplete, context‑agnostic regular‑expression filter in the has_xss() function used by Horilla HRM version 1.4.0. Malicious input can be inserted into the project name field, allowing an attacker to redirect users, execute arbitrary JavaScript, and capture CSRF tokens that may later be used for further exploitation. This constitutes a classic cross‑site scripting vulnerability described by CWE‑79.

Affected Systems

Horilla HRM installations running version 1.4.0 are affected. The security issue was addressed in version 1.5.0, so any deployment on 1.5.0 or later is not vulnerable.

Risk and Exploitability

The CVSS score of 4.8 categorizes the flaw as moderate, while the EPSS score of less than 1% indicates a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers would typically need to target users of the HRMS by submitting a crafted project name through the web interface, a common web‑application attack vector.

Generated by OpenCVE AI on April 18, 2026 at 15:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Horilla HRM to version 1.5.0 or later to apply the vendor fix
  • If an upgrade cannot be performed immediately, enforce server‑side validation that restricts project names to alphanumeric characters and a reasonable maximum length
  • Apply proper output encoding or escaping to render any remaining script content harmless in all output contexts

Generated by OpenCVE AI on April 18, 2026 at 15:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:horilla:horilla:1.4.0:*:*:*:*:*:*:*

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Horilla
Horilla horilla
Vendors & Products Horilla
Horilla horilla

Thu, 22 Jan 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 04:00:00 +0000

Type Values Removed Values Added
Description Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the has_xss() function attempts to block XSS by matching input against a set of regex patterns. However, the regexes are incomplete and context-agnostic, making them easy to bypass. Attackers are able to redirect users to malicious domains, run external JavaScript, and steal CSRF tokens that can be used to craft CSRF attacks against admins. This issue has been fixed in version 1.5.0.
Title Horilla HRM has XSS Bypass through Project Name
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-22T12:36:02.772Z

Reserved: 2026-01-20T22:30:11.776Z

Link: CVE-2026-24037

cve-icon Vulnrichment

Updated: 2026-01-22T12:35:58.155Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T04:15:59.743

Modified: 2026-01-29T18:56:43.700

Link: CVE-2026-24037

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:30:03Z

Weaknesses