Description
OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source fails to restrict email template file resolution to the intended plugins directory, allowing an authenticated actor who can influence the template path to read arbitrary local files. This vulnerability is fixed in 5.8.1.
Published: 2026-04-07
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary local file read via path traversal by an authenticated user
Action: Patch
AI Analysis

Impact

The flaw permits an authenticated user to influence the email template path, which lets the application read any file on the server. This can disclose confidential data, expose internal configuration, and potentially leak system credentials. The vulnerability is a classic Path Traversal weakness.

Affected Systems

OrangeHRM Open Source versions 5.0 through 5.8 are vulnerable. The issue was fixed starting with 5.8.1. All installations of the affected versions that are reachable via the web interface are at risk.

Risk and Exploitability

The CVSS score of 4.6 indicates moderate severity, and the EPSS score of less than 1% suggests low current exploitation prevalence. The vulnerability is not listed in the CISA KEV catalog. The attack vector is strictly local or internal: an attacker must be able to authenticate to the OrangeHRM web interface to specify the template path. Successful exploitation requires that the web server process can read the targeted files, and the attacker benefits by obtaining arbitrary local file contents such as system configuration files, logs, or credential files.

Generated by OpenCVE AI on April 9, 2026 at 17:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OrangeHRM Open Source to version 5.8.1 or later, which contains the fix for the path traversal issue.
  • Verify the current installed version to ensure it is not within the vulnerable range.
  • If an upgrade is not immediately possible, restrict the ownership and permissions of the email template and plugin directories to prevent the web server from reading sensitive files.
  • Consider applying web application firewall rules to block requests that attempt to reference paths outside the intended plugin directory.

Generated by OpenCVE AI on April 9, 2026 at 17:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:orangehrm:orangehrm:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Orangehrm
Orangehrm orangehrm
Vendors & Products Orangehrm
Orangehrm orangehrm

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source fails to restrict email template file resolution to the intended plugins directory, allowing an authenticated actor who can influence the template path to read arbitrary local files. This vulnerability is fixed in 5.8.1.
Title OrangeHRM Affected by Arbitrary File Read via Path Traversal in Email Template Loader
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 4.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Orangehrm Orangehrm
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T19:27:15.409Z

Reserved: 2026-04-06T20:28:38.394Z

Link: CVE-2026-39345

cve-icon Vulnrichment

Updated: 2026-04-07T19:26:59.087Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T19:16:45.480

Modified: 2026-04-09T16:29:49.450

Link: CVE-2026-39345

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:41:18Z

Weaknesses