Description
Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the OTP handling logic has a flawed equality check that can be bypassed. When an OTP expires, the server returns None, and if an attacker omits the otp field from their POST request, the user-supplied OTP is also None, causing the comparison user_otp == otp to pass. This allows an attacker to bypass two-factor authentication entirely without ever providing a valid OTP. If administrative accounts are targeted, it could lead to compromise of sensitive HR data, manipulation of employee records, and further system-wide abuse. This issue has been fixed in version 1.5.0.
Published: 2026-01-22
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass (two-factor authentication can be circumvented)
Action: Apply Patch
AI Analysis

Impact

A flaw in the OTP handling logic of Horilla makes the equality check between the user‑supplied OTP and the stored OTP perform a comparison with a None value when an OTP has expired. If an attacker omits the OTP field in a POST request, the request OTP is also None and the comparison succeeds, allowing an authenticated session without a valid code. This flaw permits a user to bypass the two‑factor authentication entirely, potentially granting full access to the system, including administrator accounts. The compromised account can then retrieve sensitive HR data, modify employee records, and execute additional actions across the platform, thereby affecting confidentiality, integrity, and availability.

Affected Systems

The issue exists in Horilla HRMS version 1.4.0, identified by the CPE string cpe:2.3:a:horilla:horilla:1.4.0. The vendor, Horilla Open Source, has released a patch in version 1.5.0 that resolves the vulnerability.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.1, indicating high severity. The EPSS score is below 1%, implying a low overall exploitation probability at the current time, and the vulnerability is not listed in CISA’s KEV catalog. The attack is likely remote, requiring an attacker to submit a crafted POST request to the authentication endpoint. Successful exploitation permits an attacker to authenticate and gain the same permissions as the targeted account, especially if the account is an administrator. While the exploitation probability is low, the potential impact on sensitive HR information and system integrity warrants prompt remediation.

Generated by OpenCVE AI on April 18, 2026 at 03:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Horilla to version 1.5.0 or later, which contains the OTP logic fix
  • Configure the authentication endpoint to require the OTP field and reject requests that omit it or contain null values
  • Enable monitoring and rate limiting on authentication attempts to detect and mitigate automated or repeated login attempts

Generated by OpenCVE AI on April 18, 2026 at 03:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:horilla:horilla:1.4.0:*:*:*:*:*:*:*

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Horilla
Horilla horilla
Vendors & Products Horilla
Horilla horilla

Thu, 22 Jan 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 04:00:00 +0000

Type Values Removed Values Added
Description Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the OTP handling logic has a flawed equality check that can be bypassed. When an OTP expires, the server returns None, and if an attacker omits the otp field from their POST request, the user-supplied OTP is also None, causing the comparison user_otp == otp to pass. This allows an attacker to bypass two-factor authentication entirely without ever providing a valid OTP. If administrative accounts are targeted, it could lead to compromise of sensitive HR data, manipulation of employee records, and further system-wide abuse. This issue has been fixed in version 1.5.0.
Title Horilla HR has 2FA Bypass through its OTP Handling Logic
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-22T12:33:39.694Z

Reserved: 2026-01-20T22:30:11.777Z

Link: CVE-2026-24038

cve-icon Vulnrichment

Updated: 2026-01-22T12:33:31.232Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T04:15:59.890

Modified: 2026-01-29T18:54:50.163

Link: CVE-2026-24038

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T04:00:08Z

Weaknesses