Vulnerability Description
Horilla is a free and open source Human Resource Management System (HRMS). An authenticated Remote Code Execution (RCE) vulnerability exists in Horilla 1.3.0 due to the unsafe use of Python’s eval() function on a user-controlled query parameter in the project_bulk_archive view. This allows privileged users (e.g., administrators) to execute arbitrary system commands on the server. While having Django’s DEBUG=True makes exploitation visibly easier by returning command output in the HTTP response, this is not required. The vulnerability can still be exploited in DEBUG=False mode by using blind payloads such as a reverse shell, leading to full remote code execution. This issue has been patched in version 1.3.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Horilla | Horilla | 1.3 |
Related Weaknesses (CWE)
References
- https://drive.google.com/file/d/1XQAJilt77QxkjGEa94CsZRqZIZXa3ET9/view?usp=shariExploit
- https://drive.google.com/file/d/1hnI9AK3fnpVrTlTRF7aRJsKhZCDIm2Ve/view?usp=shariExploit
- https://github.com/horilla-opensource/horilla/commit/b0aab62b3a5fe6b7114b5c58db1Patch
- https://github.com/horilla-opensource/horilla/security/advisories/GHSA-h6qj-pwmxExploitVendor Advisory
FAQ
What is CVE-2025-48868?
CVE-2025-48868 is a vulnerability with a CVSS score of 7.2 (HIGH). Horilla is a free and open source Human Resource Management System (HRMS). An authenticated Remote Code Execution (RCE) vulnerability exists in Horilla 1.3.0 due to the unsafe use of Python’s eval() f...
How severe is CVE-2025-48868?
CVE-2025-48868 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-48868?
Check the references section above for vendor advisories and patch information. Affected products include: Horilla Horilla.