Description
OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source encrypts certain sensitive fields with AES in ECB mode, which preserves block-aligned plaintext patterns in ciphertext and enables pattern disclosure against stored data. This vulnerability is fixed in 5.8.1.
Published: 2026-04-07
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Disclosure
Action: Patch promptly
AI Analysis

Impact

OrangeHRM Open Source versions 5.0 through 5.8 use AES in ECB mode to encrypt sensitive fields. ECB mode preserves block‑aligned plaintext patterns in the ciphertext, which is a weakness classified as CWE‑326. This flaw allows an attacker who can read the encrypted data to observe repeating patterns that correspond to identical plaintext blocks, revealing structural information about the data without the need for key recovery. The result is a loss of confidentiality for fields that should remain protected, such as employee personal identifiers or credentials. The vulnerability does not provide code execution or direct system compromise; its impact is limited to pattern disclosure and potential inference of sensitive values.

Affected Systems

The affected product is OrangeHRM Open Source. Versions from 5.0 up to and including 5.8 are vulnerable. Version 5.8.1 and later include a fix that replaces AES‑ECB with a stronger encryption mode, eliminating the pattern disclosure issue.

Risk and Exploitability

The CVSS score of 2.1 indicates low severity, and the EPSS score of less than 1% reflects a low likelihood of exploitation. OrangeHRM is not listed in the CISA KEV catalog, suggesting that this flaw is not widely exploited. Attackers would need legitimate or compromised read access to the database or application configuration to benefit from the pattern disclosure. Because the vulnerability exposes only statistical patterns and not plaintext, the immediate threat is a potential compromise of data confidentiality rather than a full system takeover. Nevertheless, in environments where sensitive employee data is stored, pattern leakage could aid in reconstructing passwords, identifiers, or other protected fields when combined with additional information.

Generated by OpenCVE AI on April 10, 2026 at 20:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the OrangeHRM patch to version 5.8.1 or later
  • Re‑encrypt existing sensitive data after patching
  • Restrict database access to authorized personnel only
  • Audit encryption settings to confirm that AES‑ECB is no longer used

Generated by OpenCVE AI on April 10, 2026 at 20:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:orangehrm:orangehrm:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}


Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Orangehrm
Orangehrm orangehrm
Vendors & Products Orangehrm
Orangehrm orangehrm

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source encrypts certain sensitive fields with AES in ECB mode, which preserves block-aligned plaintext patterns in ciphertext and enables pattern disclosure against stored data. This vulnerability is fixed in 5.8.1.
Title OrangeHRM Uses AES-ECB for Sensitive Data Encryption Enables Pattern Disclosure
Weaknesses CWE-326
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Orangehrm Orangehrm
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T19:27:43.612Z

Reserved: 2026-04-06T20:28:38.394Z

Link: CVE-2026-39349

cve-icon Vulnrichment

Updated: 2026-04-07T19:27:39.771Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T19:16:46.067

Modified: 2026-04-10T19:32:40.850

Link: CVE-2026-39349

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:26:23Z

Weaknesses