Description
Horilla is a free and open source Human Resource Management System (HRMS). Version 1.4.0 has Improper Access Control, allowing low-privileged employees to self-approve documents they have uploaded. The document-approval UI is intended to be restricted to administrator or high-privilege roles only; however, an insufficient server-side authorization check on the approval endpoint lets a standard employee modify the approval status of their own uploaded document. A successful exploitation allows users with only employee-level permissions to alter application state reserved for administrators. This undermines the integrity of HR processes (for example, acceptance of credentials, certifications, or supporting materials), and may enable submission of unvetted documents. This issue is fixed in version 1.5.0.
Published: 2026-01-22
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized modification of document approval status by low‑privileged employees
Action: Patch
AI Analysis

Impact

The flaw is an improper access control that allows standard employees to change the approval status of documents they themselves have uploaded. By bypassing a server‑side authorization check, an attacker with only employee permissions can alter application state that should be restricted to administrators. This violation of access control (CWE‑284) undermines the integrity of HR processes such as credential verification and material acceptance.

Affected Systems

The vulnerability affects the Horilla Human Resource Management System, version 1.4.0. The flaw was corrected in version 1.5.0, so systems running the 1.4.0 release are vulnerable.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate impact. The EPSS score of less than 1 % suggests a very low probability of exploitation, and the CVE is not listed in CISA’s KEV catalog. The attack requires an authenticated employee who can access the approval endpoint, so the most likely vector is a legitimate user exploiting the missing server‑side check.

Generated by OpenCVE AI on April 18, 2026 at 03:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Horilla to the 1.5.0 release to apply the access control fix
  • Modify the role‑based access control configuration to ensure that only administrator or high‑privilege roles can access the document‑approval API endpoint
  • Audit existing approvals to identify and correct any that were incorrectly auto‑approved by standard employees

Generated by OpenCVE AI on April 18, 2026 at 03:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:horilla:horilla:1.4.0:*:*:*:*:*:*:*

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Horilla
Horilla horilla
Vendors & Products Horilla
Horilla horilla

Thu, 22 Jan 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 04:00:00 +0000

Type Values Removed Values Added
Description Horilla is a free and open source Human Resource Management System (HRMS). Version 1.4.0 has Improper Access Control, allowing low-privileged employees to self-approve documents they have uploaded. The document-approval UI is intended to be restricted to administrator or high-privilege roles only; however, an insufficient server-side authorization check on the approval endpoint lets a standard employee modify the approval status of their own uploaded document. A successful exploitation allows users with only employee-level permissions to alter application state reserved for administrators. This undermines the integrity of HR processes (for example, acceptance of credentials, certifications, or supporting materials), and may enable submission of unvetted documents. This issue is fixed in version 1.5.0.
Title Horilla's Improper Access Control Allows Employees to Auto-Approve Documents
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-22T12:30:11.282Z

Reserved: 2026-01-20T22:30:11.777Z

Link: CVE-2026-24039

cve-icon Vulnrichment

Updated: 2026-01-22T12:30:05.559Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T04:16:00.033

Modified: 2026-01-29T18:47:30.633

Link: CVE-2026-24039

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T04:00:08Z

Weaknesses