Impact
The vulnerability in HireFlow v1.2 allows injection of arbitrary HTML and JavaScript into the Resume or Feedback Comment fields. When a user submits data via the POST /candidates/add or POST /feedback/add endpoints, the content is stored without sanitization and later displayed in candidate_detail.html, resulting in client‑side script execution. This is a classic stored XSS flaw classified as CWE‑79.
Affected Systems
The affected software is HireFlow version 1.2. No additional vendor or product information is specified beyond the application name and version. The scope is limited to the application; there is no mention of external dependencies or system components.
Risk and Exploitability
The CVSS score of 5.4 denotes moderate severity. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog, indicating no confirmed widespread exploitation. Exploitation requires the ability to send the relevant POST requests, which likely depends on access to the application but is not detailed in the description. The risk is considered moderate pending further information on the attack vector.
OpenCVE Enrichment